, 0x0, 0x0}, &(0x7f0000000880)=0xc) syz_mount_image$hfs(&(0x7f00000003c0)='hfs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0x7, &(0x7f0000000780)=[{&(0x7f0000000940)="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", 0x1000, 0x401}, {&(0x7f0000000440)="a8a435dbef1de4c339cef7c94ebef7559cd2ce7910acd2154970a3f47ada34eac4e22fa5c6b0a1296aaab655a81c7ce9af7f4c9fe8a1f2099fe7a2f72c744d757422285d1a0b390875672610a301c69bb7ae5bd922445d4cab9bdc368a3a089cfd8f55f2a13fd3a0cf71863daa21b1f6ce9b974fe5058948a030d6267b213eb4736e85b3277101173cd0bc06d6b588f99ae8aa5d9d4e248b82510f5491c70cf219c260f47dd16f8edbe4af4164013e21d7b4df1a07702ef9188c7e3379c04061393c4e2843cc97fcde22a4aab64df9fbebe7463acf02e943471b1ea48dec2de51d811b89c8abd13c02d16cfc8a", 0xed, 0x4}, {&(0x7f0000000540)="257fd34d69b779a94321893a338164bea56e51d88811c26f0adf86a08f62f7", 0x1f}, {&(0x7f0000000580)="b75d9034c9c71c463a6080fd070353788a758b16c2b8a3bb34eeaae2e5cfce8da1fc0a2578741b53bb4c4e1cb80b99eaa3e0cc", 0x33, 0x10000}, {&(0x7f00000005c0)="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", 0xfc, 0x8}, {&(0x7f00000006c0)="957fadcd75c68481e56fefc032caa4fcd0568c6cdfc5633daf", 0x19, 0x7}, {&(0x7f0000000700)="063a54b8b52f1f50eab9b213bd531142c5f1d5e305a4748128d9121469952b06d87f98856482e255a17cd86ec62e880757e048733a96bdc009273e38cf2453b283491bb70dd54a704bf65a115563383f09b6953d9afe3ab9841ef1cb1562f594a31156bfe2f2c013e85f5f87194500297a45126a0aa4", 0x76, 0x7ff0000000}], 0x40000, &(0x7f0000001940)={[{@gid={'gid', 0x3d, r1}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r0}}, {@appraise='appraise'}, {@subj_role={'subj_role', 0x3d, 'appraise'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@subj_role={'subj_role', 0x3d, ','}}]}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="4c777eb7676a92012c3741472f4a6eba76b33ac85e69c0bbf9a416d9d1dd7a145321e74ca8c5e9484c50453359aa7cae9eaa34f7456fe7c9b55ac207b61613b46f543171e75a976cd498f1b88174751f8574", 0x52, 0x59}], 0x800000, &(0x7f0000000340)={[{@show_sys_files_no='show_sys_files=no'}], [{@fowner_gt={'fowner>', r0}}, {@obj_user={'obj_user', 0x3d, 'btrfs\x00'}}, {@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x100}}]}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 625.525786] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 [ 625.540769] BTRFS error (device loop4): open_ctree failed [ 625.558463] BTRFS error (device loop4): superblock checksum mismatch [ 625.601655] BTRFS error (device loop4): open_ctree failed [ 625.608914] BTRFS error (device loop4): superblock checksum mismatch [ 625.660805] BTRFS error (device loop4): open_ctree failed 23:26:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ext4\x00', 0x14, 0x0) r0 = getegid() syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="4b58a123da6d160980da2196dd91dc2810e63fe7637f154fe8067172751daeda5cd761e5b2005b460c8fa617fff1a13b5b7f9e1ad1b71538e46a6e4ea623fce1bc03b8439703a2c266ebf206a0a7f1db72c213f5e994464e522bc107af6a96296b52de6f18642e91f7177f63708211b819701c254b92de4d6140201fc66c4db37e1f751b156cbca029cd3cb77b3f3f", 0x8f, 0x1}, {&(0x7f0000000940)="dfb8240ba236ad4dfcd6a91e8dbc9b413c2dce6665497a031f5265a87d69f2e1b90e9387799bc01b0d102e0e62f0e52fb953e9a9c783828948c5dbaed179e1b5057c94d49c93b6e0e1bc3831ccf7435208cc2ff66f2fccd51f23b4e4a370a165b618292f9f95616536aa15479deddae5a0bfc39003235103b0e22dedcdebe2194845e79e18bf2ff4f184f3e1516f36a4230b2fc5740b94a4b9470f96d693d6cf60a52923d0c5683096154147451abfed8a14ace7fb437150bef076c42d297676fe925b1e17255988e9eff2f92478687c5df1ac1a11d821803a398403e1c506f09004852ae8c28353c7dea86d1d3acbc0b52455a503b4f7f620a24de5e9d5c2937f89e58c34ef3686156b2466cd06a7d99a0ecfce73dce5232b3b8daf15d4119d5a97d74ab509f616ae55fa109c8bc45e80ad0b757a15a80d668cd217104bcc64e3327fd5e219175dd6b64e4d2a5e11cec3ac5618cac301bfa5b65138eb78369edf3adec5e2c13258098e75d80b75ce13e59b320da9f751d18cc4209579c5773d958499e8af319f0f91d48c4b1ea15052a4f650dde5db9d7276ea3cd8db8d8a1624755d85465ffa78534cbe16364dd4292376c3e4f2c072929d2e21985d88c3382ddeff5f9231929ce0094818e808978c807e6d7cb4f4b736b1fad632e087f77ecc46f81e8c87f5cf5a9610e5e894c661379d942c41e7b3258e225d4688eff2e1f9998fc4f4a9d7f3d7dda5052980d96555e674d892d4972861882e385cb69bee27ec3990d522467b4d968e6c1e2e39402f51af57ae258b08cec7c51635e81ea2ace2ed2b954082f5c1e5ab483226b889050dffbc8c5d5856a5df652b34417bf187e7b8f84f7811fd954ed4dff587b972ccaea1430f5cc452ab6f37f241fd5788217823aba96a125fe1bad282865ff431917f2e616b32bae7d46c835dc5005655ce38caec709cbb7e2fae1b08d01fdf93e2536bccb41234199c07306286d7b38b424ca5627a5326a83db276be86376e64f8f06e0382e435427e0df71603ca21dfd2671c863be4e8a8bba4db27a2162b1a89fc0c6d2a212bae166a2de779be63260661c064f2a918493ad06aa26048dd7cf5a5808a0866fa96e34ea2d32e9ff6d7f8b0058cfdec5c8018548152b0c433f9dfd4064b68f6a381b4d1996f32241fca45b47b971a317953e67735e35001a8d3c70288f1df8c37a3980ecb941df5b93712eb9934abc3e36ec1c9463332db1a15ff56b52cd5349b3d3922fdeab306241409a4f9564d057372a7a57fd47e065cd8352ded9dc1517779ebb4d2e3ce52c3d7631154117b828f919d23baadbcd7ce1902245195b0715b603481e7078006bebecdc0194e8de76b3ea811e03bd855eb9826745a4f59cc25b26c5d48ef83fd7504e892d81e3422f3c6170a5915b7541cc6d622440261d9575f92f77db7b42c2c508fe68152cc249a7efad58064344ee8869cca46b225643cb5785b68c82b24800a5af50513bc9a02dba02c668adbc52c7656662cb981b4220d7aee8661d9a742003fd8f393d25ec5fe17c5b68104f8865667d9e0bd7fcd57077543bdbdd242e2a16c56c67d9bb77f0f803e14f514f65b0f1e87c32c0843eb45f7ef01a2e9cdc9420138e78a4e1bafe8d3c78e1c18ec465365b8fba77bd90e413a6cbbb5bc9da909ba235882de4347395f96fd040a86dbc8e463cde06ed4d93570034feeee37c85601bb1da00ec26ff0af0960dc8e3a798a6c6f0428ab513917ade004223930de0c104a2003b96c2b066d3fe0ce4f782f078317f34451ef09c7339a671e150ea9eaffa10fb59e1c58870daeff4dd693bf0ea4fbb33665013e36862b38073ce7d92bd3422cc0064b0d7967ef1aeeff998878fac9f887f7f1dd81e898426a55fda5fede73ec689e695cddb25615287705c1ccfc4b451db5fd0cdc6845ac3040671e8cb7283ed267971791d8e0e61e05afbed847ede1cee3954e635d231242950bce54bf2313c01865c304997842b1671dc6a91708835081f29c64b96d37c14137b68c08e15015d9f42cf4b86f4f0cb76571700b4314380e15e6df472b2a1bfac4beeeb47e9779a352429bffb63681ca094dc7adb7e7f2d5aaffa813adf413e3b34e832e66c5512d1ec4e0bd2db482289608143afee7e15431e616bb3f23af2112509318d8286ec6e080a7ebed4823f5e427ac0f5037c027f97d8d08f5b6805495528dcfbd49401dd03fe7476667105c277f00a02d92868c2bfd7ad6afdf9eec759e710ad3e82da9eab7f58b41adfabe71c37c2123754e42f5c8efd52f0eca55a35550b37e9e12424f7c07b2e9a9e17e29edbb56fedb6337a34d90ec41a8114385ba19cd4c019d69e671ee8fc3aded08c18224baecdd95743a733ef220d91b59aa1d06810a9c56ae46f0b42a70ef3bb9c78e1d65e99ecfe331fca238762d224e9906ddc7d1c0aff08e25671e5b203f1256d3dd7577aaa0bc8f97398b0158204f944b4f009442360e8593d370a2c90c002907b33c2a0d412a3b60ff4d78e37120d19fc3379381c6259c6a46acb8442d36fcdb34f7e6b897429f16f0aa3adb375bbd3b29682df1458296ea2c9769d145bace20bffcd4e5f49257e8edc74c89a1413a34904ac0314cf3b7326bbab77e2e161c7c2288fe17391cb3b2eb90f360c308685cc21d31d8136b9a7dd69ed47de55e14b2fa4c66b4031380850333eaf0e5c85755c1fd83bee1ae451cb5800730a8abcbfeb4e3c6d4f88e47675986d22e02ebaebf6197a7557cffd1182595084851211a761952c7285154bb2359fad7a030a2d7544645a3bc0567fbc2d5821e9532d20d714ecba8a0a3453ef2828b309eb54be0aa92018938c205809331b2cdb3c03d153d625784e5c328abe94d40a7630a44b7b50f948c40e7365630196f9c859ad69142aa064ccb90dc0c7bb271d7d33ff2f5eb8fb28e5f5cea853b15a7e1bba540a885e8e04f20c6f0823ffdd98b7db4f809514e25c12613135637a51a7bceb137494e6e8f32a2867dd9ceeeaade669f4166af95fab16cde1a9c5a9dd8d81755a830156c1355f1ff0de82785cb5455d27ab0a282b795a6d2d45367cd6a9afb4d0d4857f5ee90094b0dacc0f3655fa51d1e493c0988cbf37ee3463cf39b34ccec74af2ae1840df59772c7c0ed55a3d29df5776b2997f0d96ba0d0c2d542a4b81e599092aa442006f4a9b48caf162b2fd8b88c273f9acd450a8ab72d8246381ea776cd04647ede1eacfd78be86518be90c6a5b1cbf6df4da930a196014bd2fe31cd2d3d51bf8335b231832f9688f9cbfd333dd6f0a7cc6fcbc1f01749a0d9117e595c5d261075d2f1cec82bec61700010a398bf7867d22862e4b8355b09fa3987dde00bc8d793303504f7356841efdecef83d60d860110f8c822e81f7ba6ee0c9d9c1d9ba77bb349af7e308d04d7b30f7313e3597d99049a7496f815beee9d9910a09a709e569c8a3929bc402f19f33b3c8841d9a1b620dcfc0340177babe38dbc399a6cc507a0040f319531cde6fbf8d455d17248125c216031ef9e5fc2d28830b2a771b78f4cf3eceb26d4f5bf338a8076af52902e0302b539c56a0cb647d4daa3b7410a056fc5d451f210b454743b0955362f9c0bd35b1d7e159d548e9add0a27e1746e8696452e4e2d725aeb5e5f86f426191abeb538c21fdb087b8625ce91e1a52b3ab31c6a42fa1183ffcaac4662c63f57d3ea3f1f349c80b37193cac03f2077ee4f0a62e6afda35d0965803aedd34940f511ab91b39a77f8cc521a397c380c58113d3cda0d5d49e9a90527a2dfe9287ad4e36da103334b94634e69359501b98cb3acdb9ca8af6d6f5ef4a6b519219f1e996607daf9d8f61615baae8a47286d7af68d459a659d6d12ec2591283cf23e9306776747f1eab8c3209a6fe51a0056a3d859d035c2e4859756ab317a403e1542a284d361fc74053f43e90bb8197c9cea54020384e0f62fab9d06b5c64f224e0c0c9d5f8eda81a8ee5ace82160b0b98017b3a9006bcde53f02f2f76038d282920b0c5f5f01e6ff1102b4ffa37db91787d15d3bc5a9e177ab8a1ea7b5fe871d08e5c608f827f5f92893ca38e953bc30cba4d6b209ec1cac5b0604fc7cd62a9a3d375c43e5f6f0c83a498ec53b1f80b009af088475dd346ba0e71c62e077cba0efcffddacf89bfd74938a7226a60c3c365e8b4ab65f6fcb5f37f5d34e89e93db131e495d53e8150e4c869592e2e92f92d67f62ca63ceff11e6e67f5997d72749935eb178cc21c841f64cd4b166af1fecbe90ab1ac023fd4e39900abdb67164845ee8d7893878f3265d1863074c27449d52f381c5d86f498480820e31cbf70ad8a2705b60fc3451507a7664b4f9189d8d90a5c86ada071f3e4b5ccca8e0f6b6812bc82910cb619cbc849ec5c58091ea7af34a9b59524ced0dd307c2e88924f3696918ff613e7be3a7e2b841657b90a23e5f13ea35cdcd78e70adce83e74f3a9f35f68afaa0d276a314aaf949eda87fd0c0fabbdf28813441d3a9534ec25c114a7ca246ebdbd38fc0f741c6e4231715971cb2a821a451284d15b48025468cd26021b38d3f4ca99937c69641328f428bf0aca6229ab4302c24adee2de9841bf1dc4a227991be59c757e9dab0823f15a58edcba6317e19a2f666db879f4fdf6441a79a0cc6862bf458b7956e779d17068dfd5098b59053c36fc91c4d62cf58df413687e853fe7576ffabe5dc2df7d53e7de1880b44b507560b237e3cd07637c93b87bdf71c3de9f8b3ab705502caf981fb20bfb0652d6dfaaaf631ee51dc6983733fa41c98d1791a8c400111977e6921eec20ea93937af4edddd61b2249dca6db482ff28e9e32376e707ccb6c4099f24ac290a1312b016db0daa343da6f5d6ac0a90171c0a1df36f135620ef94d869dfd89b78286033669fb0a89992c32340b88f615692327b423a0bac642581eba725fdf2a6f2ebdde0e745ee826d6190fe1fc2fc4226a60ea133cbfd936ca81ab8c26f2773abac0ff919081666b90de89abcfa47bdc9810108d979409e83a909afa228a6904eb82c7d27aa4b37f3a25f3caae2a01b99f5097969d1bb50b2df44b8887217b6e9b2b7cc7487e6916535c5cffd881140398311d7cf98016f53ee362657b6fa186812dc60e747ed3c7b12b83c5d055a08963a9da56020070f95f59e04ae21c53226e27041c29e0dc31042637573f99032690a366c019e5854c5661eb668fa4528c793c3eb43b43363985ea50055a6d7f23423dd11b3989148f9022786c126fedbb2765d6ae07ce65ee3d71efc5d4841b378899eae4a479261dbf83eb4e3f6ee7540c80049bb2115894d63f5de51195d5a569df8044b18909d170c3b18fc2bd2a8ff192f22e6510592c859cddbcc69394ce2696a48f6287c33d4fb3e5af32dc67140e4c6138daad488a1d712d6d6a444df644382c510a413b04a1b9787fbb5ac034445390c3bb3af9d2f4a2103d64c143f5005985442f224919a88261f27eb53b872b89db3ce3574890fa2cd9b68ff5006dfee3dd0b99edd5bb31829beca5a56f3be278e60142a3d5571654e7e45e5a8ae862457e6416e83eaf10718a1f355829c761f118c78241c94243c9ee7f1efb73d44047cbc9fee258865635827fb766688576290d7bba9ca809ad66cabfa00cb1a7384ef78f7217ef8f561413fea1f56ebecb038ec8c27a8458578c2ac6966f6175f23eb7630c2edcc4d56021a8b7a23706c06b3d412f54dcd440ce2e8228d43efb21d0c9e353d71f427a0c2acb468e261ac15d00af89ec20ff7f83cf7ea558359a4bc", 0x1000, 0xff}], 0x820000, &(0x7f0000000300)={[{@gid={'gid', 0x3d, r0}}, {@errors_recover='errors=recover'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@utf8='utf8'}, {@errors_recover='errors=recover'}, {@show_sys_files_no='show_sys_files=no'}], [{@smackfsdef={'smackfsdef'}}]}) 23:26:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1f, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000940)="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") stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x1b, 0x2000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000280)={0x5, 0x1, 'client0\x00', 0xffffffff80000003, "cc3312472880a0aa", "9d21c29f555459ef151b09fb67a0494a1ddf7f5593807c367864aa0723911835", 0x10000, 0x4}) 23:26:19 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 625.692670] audit: type=1800 audit(1566343579.021:384): pid=15976 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=17495 res=0 23:26:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x9, 0x100) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000100)={0x67c270d992d5a1c6, 0x6}) 23:26:19 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000180)={0x1, {0x9, 0x8, 0x0, 0x7f}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x5, 0xaf48a984040138a2) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) 23:26:19 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8, 0x200000) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x270, 0x200000) r3 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) link(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="65000000c4823d34ce1783e5e21bfd1ce19689c693592d52dd69bf720bcc70d7a2cd68573b972590d14e415cd34e2413e272bd1958cef25587a07a86d8d2553bf0a537ca833b06e369062179cb548c607361368a1f731f6d6fc58ed0f53f7d5357b155", @ANYRES16=r1, @ANYBLOB="02002abd7000fcdbdf25020000000c00020005000000000000000c00080004000000000000000c00080005000000000000000c00080007000000000000000c000400600e0000000000001400070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3], 0x64}, 0x1, 0x0, 0x0, 0x40001}, 0x40800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000580)={0x9, 0x6, 0x1f, 0x6, 0x2, 0x101}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0xc8, "626f6dbc8f729c0e0adf36db96ebc227006fbe16e091c973ad75dac1edaa3fa2ede4fa15cf096ab0dfa63e75c4c81ed5b4aed8da0ab9737b5992efae1dca0d74a15f107a31df1a476f7d8bc0a973700d5efc63b14585d894abfd47be0e390da9cdea0d4c92ea6b2031188b82a548803d61a52c60748107a3cd96f9cff2ed7b6c3f1df51f82452da9b452e10b803713d98bc860a2229aba617e07cf788a5c74d84f2f8fedc01549bfc346656eaa191bc3ec73a586a1eef482adbf810c028ed44196907f601b53ca0d"}, &(0x7f0000000400)=0xd0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000004c0)={r4, 0x4}, &(0x7f0000000480)=0x13c) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000540)={{0xfffffffffffffe00, 0x9, 0xff, 0x7, 0x1, 0x4}, 0x0, 0x0, 0xccc}) [ 625.736006] audit: type=1804 audit(1566343579.021:385): pid=15976 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir139463755/syzkaller.YFzoAP/1401/file0" dev="sda1" ino=17495 res=1 23:26:19 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) connect$unix(r0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) socket$packet(0x11, 0x3, 0x300) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:19 executing program 5: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x1, 0x2000) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x25dfdbfe, 0x4000000}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) accept$netrom(r2, &(0x7f0000000100)={{0x3, @bcast}, [@null, @default, @bcast, @null, @bcast, @bcast, @bcast, @netrom]}, &(0x7f0000000180)=0x48) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) sendmsg$rds(r2, &(0x7f00000007c0)={&(0x7f0000000240)={0x2, 0x4e22, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/13, 0xd}, {&(0x7f00000002c0)=""/218, 0xda}], 0x2, &(0x7f0000000c80)=ANY=[@ANYBLOB="580000000000000014010000080000000300000006000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="0500000000000000"], @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="0104000000000000"], @ANYBLOB="0800000000000000ff000000000000000800000000000000000000000000000c40000000000000008100000000000000480000000000000014010000010000000800000006000000", @ANYPTR=&(0x7f0000000b40)=ANY=[@ANYBLOB="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"/317], @ANYBLOB="20000e00d850446fb03bc94241641769b123f02e0184f7f5db4eb5a5ea1d76664f8385a1c52eb7ea17b44ae917024316950ffb4d0fbeb31dfb31783eda6974435030a40bd4c195f25a10f7ad585ee8cfb5a99a5876c27df31d63a06f9fc475ba48261a0745f0093bc533b00303e7e370f518bcbdfbf27ba26b00ec55bcd5e0aac7ca321ca22c0f890c69aa3960369d121167981f9a95e22791a9d3513103", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/168], @ANYBLOB="a800000000000000"], @ANYBLOB="01000000000000001000000000000000ff0f000000000000180000000000000014010000020000000a910000000010001800000000000000140100000c000000feffffff00000000580000000000000014010000080000000000000009000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="0400000000000000"], @ANYBLOB="90050000000000000180000000000000657300000000000000000000000000000800000000000000040000000000000058000000000000001401000008000000b10e000068080000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB="0400000000000000"], @ANYBLOB="03000000000000000900000000000000ff7f00000000000080000000000000000000000000000000ff01000000000000580000000000000014010000090000000000000004000000", @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000780)=ANY=[@ANYBLOB="0500000000000000"], @ANYBLOB="ff0f00000000000006000000000000000500000000000000a90000000000000061000000000000009203000000000000"], 0x1d8, 0x80}, 0x8000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000480)={0x0, 0xffffffffffffffe1, 0x20}, &(0x7f00000004c0)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={r3, 0x7fffffff}, 0x8) [ 625.839659] BTRFS error (device loop1): superblock checksum mismatch [ 625.840779] EXT4-fs (nullb0): VFS: Can't find ext4 filesystem 23:26:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x14280, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) [ 625.894835] FAULT_INJECTION: forcing a failure. [ 625.894835] name failslab, interval 1, probability 0, space 0, times 0 [ 625.919712] CPU: 0 PID: 16000 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 625.926814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.936152] Call Trace: [ 625.938729] dump_stack+0x138/0x19c [ 625.942354] should_fail.cold+0x10f/0x159 [ 625.946499] should_failslab+0xdb/0x130 [ 625.950474] kmem_cache_alloc+0x2d7/0x780 [ 625.954617] ? __mutex_unlock_slowpath+0x71/0x800 [ 625.959448] ? __lock_is_held+0xb6/0x140 [ 625.963505] __kernfs_new_node+0x70/0x420 [ 625.967646] kernfs_new_node+0x80/0xf0 [ 625.967658] __kernfs_create_file+0x46/0x323 [ 625.967669] sysfs_add_file_mode_ns+0x1e4/0x450 [ 625.975920] internal_create_group+0x232/0x7b0 [ 625.975936] sysfs_create_group+0x20/0x30 [ 625.975947] lo_ioctl+0x1176/0x1ce0 23:26:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x0, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x5905081f, 0x0) linkat(r0, &(0x7f0000000280)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x400, &(0x7f0000000140)={[{@xino_on='xino=on'}, {@xino_off='xino=off'}, {@index_off='index=off'}, {@metacopy_off='metacopy=off'}, {@default_permissions='default_permissions'}, {@workdir={'workdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@index_on='index=on'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_off='xino=off'}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@seclabel='seclabel'}, {@obj_role={'obj_role', 0x3d, 'btrfs\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x61, 0x38, 0x61, 0x63, 0x34, 0x38], 0x2d, [0x65, 0xee86ca1185b11720, 0x65, 0x36], 0x2d, [0x31, 0x38, 0x34, 0x32], 0x2d, [0x61, 0x96e1e6340a6259f5, 0x35, 0x33], 0x2d, [0x64, 0x32, 0x0, 0x62, 0x63, 0x0, 0x37]}}}, {@context={'context', 0x3d, 'root'}}]}) 23:26:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x284c487ffda3f939, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) r2 = getpgrp(r1) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x400000, 0x0) prlimit64(r2, 0xd, &(0x7f00000000c0)={0x435, 0x8}, &(0x7f0000000180)) [ 625.975957] ? loop_probe+0x160/0x160 [ 625.975967] blkdev_ioctl+0x96b/0x1860 [ 626.000565] ? blkpg_ioctl+0x980/0x980 [ 626.004443] ? __might_sleep+0x93/0xb0 [ 626.008316] ? __fget+0x210/0x370 [ 626.011761] block_ioctl+0xde/0x120 [ 626.015499] ? blkdev_fallocate+0x3b0/0x3b0 [ 626.019821] do_vfs_ioctl+0x7ae/0x1060 [ 626.023701] ? selinux_file_mprotect+0x5d0/0x5d0 [ 626.028446] ? lock_downgrade+0x6e0/0x6e0 [ 626.032585] ? ioctl_preallocate+0x1c0/0x1c0 [ 626.036980] ? __fget+0x237/0x370 [ 626.040425] ? security_file_ioctl+0x89/0xb0 [ 626.044825] SyS_ioctl+0x8f/0xc0 [ 626.048177] ? do_vfs_ioctl+0x1060/0x1060 [ 626.050527] audit: type=1400 audit(1566343579.241:386): avc: denied { getrlimit } for pid=16027 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 [ 626.052312] do_syscall_64+0x1e8/0x640 [ 626.052321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 626.052335] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 626.052341] RIP: 0033:0x459697 [ 626.052347] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 626.099952] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 626.107193] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 626.114431] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 626.121674] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 626.128920] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 [ 626.140941] BTRFS error (device loop1): open_ctree failed [ 626.151968] BTRFS error (device loop4): superblock checksum mismatch [ 626.190436] BTRFS error (device loop4): open_ctree failed [ 626.197840] BTRFS error (device loop4): superblock checksum mismatch [ 626.231797] EXT4-fs (nullb0): VFS: Can't find ext4 filesystem [ 626.250414] BTRFS error (device loop4): open_ctree failed [ 626.258656] BTRFS error (device loop4): superblock checksum mismatch [ 626.320473] BTRFS error (device loop4): open_ctree failed [ 626.337852] BTRFS error (device loop4): superblock checksum mismatch [ 626.370173] BTRFS error (device loop4): open_ctree failed [ 626.381497] BTRFS error (device loop4): superblock checksum mismatch [ 626.400096] net_ratelimit: 18 callbacks suppressed [ 626.400100] protocol 88fb is buggy, dev hsr_slave_0 [ 626.400122] protocol 88fb is buggy, dev hsr_slave_0 [ 626.405072] protocol 88fb is buggy, dev hsr_slave_1 [ 626.410075] protocol 88fb is buggy, dev hsr_slave_1 [ 626.415094] protocol 88fb is buggy, dev hsr_slave_0 [ 626.430063] protocol 88fb is buggy, dev hsr_slave_1 [ 626.435091] protocol 88fb is buggy, dev hsr_slave_0 [ 626.440131] protocol 88fb is buggy, dev hsr_slave_1 23:26:19 executing program 1: 23:26:19 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) 23:26:19 executing program 0: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x200, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000100)={0x108, 0x0, 0x3, [{0x6, 0x0, 0x1, 0x6, '/'}, {0x4, 0x3, 0x1e, 0x36, 'selinuxproc%cpuset+)cgroupproc'}, {0x0, 0x1, 0x1, 0x8, '('}, {0x2, 0xfffffffffffffff9, 0x6, 0x6, 'btrfs\x00'}, {0x4, 0x8, 0x8, 0xfffffffffffffffb, 'lo.ppp1@'}, {0x1, 0x3, 0x1, 0x4, '%'}, {0x1, 0x8, 0x6, 0x401, 'btrfs\x00'}]}, 0x108) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfeb9, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_create(r0, &(0x7f0000000180)=@access={'system_u:object_r:syslogd_var_lib_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x3}, 0x53) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) 23:26:19 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x729, 0x2) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000100)={0x1, 0x7fff, 0x1, 0x4, 0x5}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = gettid() fcntl$setown(r1, 0x8, r2) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 626.484138] BTRFS error (device loop4): open_ctree failed [ 626.552298] BTRFS error (device loop5): superblock checksum mismatch [ 626.561613] FAULT_INJECTION: forcing a failure. [ 626.561613] name failslab, interval 1, probability 0, space 0, times 0 [ 626.594092] CPU: 1 PID: 16063 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 626.601277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.610606] Call Trace: [ 626.613171] dump_stack+0x138/0x19c [ 626.616777] should_fail.cold+0x10f/0x159 [ 626.620899] should_failslab+0xdb/0x130 [ 626.624848] kmem_cache_alloc+0x2d7/0x780 [ 626.628969] ? __mutex_unlock_slowpath+0x71/0x800 [ 626.633782] ? __lock_is_held+0xb6/0x140 [ 626.637815] __kernfs_new_node+0x70/0x420 [ 626.641935] kernfs_new_node+0x80/0xf0 [ 626.645793] __kernfs_create_file+0x46/0x323 [ 626.650173] sysfs_add_file_mode_ns+0x1e4/0x450 [ 626.654816] internal_create_group+0x232/0x7b0 [ 626.659373] sysfs_create_group+0x20/0x30 [ 626.663492] lo_ioctl+0x1176/0x1ce0 [ 626.667105] ? loop_probe+0x160/0x160 [ 626.670880] blkdev_ioctl+0x96b/0x1860 [ 626.674740] ? blkpg_ioctl+0x980/0x980 [ 626.678619] ? __might_sleep+0x93/0xb0 [ 626.682478] ? __fget+0x210/0x370 [ 626.685905] block_ioctl+0xde/0x120 [ 626.689506] ? blkdev_fallocate+0x3b0/0x3b0 [ 626.693798] do_vfs_ioctl+0x7ae/0x1060 [ 626.697660] ? selinux_file_mprotect+0x5d0/0x5d0 [ 626.702387] ? lock_downgrade+0x6e0/0x6e0 [ 626.706508] ? ioctl_preallocate+0x1c0/0x1c0 [ 626.710889] ? __fget+0x237/0x370 [ 626.714315] ? security_file_ioctl+0x89/0xb0 [ 626.718694] SyS_ioctl+0x8f/0xc0 [ 626.722029] ? do_vfs_ioctl+0x1060/0x1060 [ 626.726149] do_syscall_64+0x1e8/0x640 [ 626.730008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 626.734829] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 626.740000] RIP: 0033:0x459697 23:26:19 executing program 0: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000100)={0x0, 0x0, @ioapic}) 23:26:20 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20000, 0x0) pipe(&(0x7f0000000140)) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x408801, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000000c0)="feb3fdc389752f22cec9b0d34abe3b2cb62f35d2d0ec2f4b1fd915", 0x1b) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 626.743165] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 626.750845] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 626.758087] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 626.765329] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 626.772568] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 626.779894] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 23:26:20 executing program 1: mknod(&(0x7f00000000c0)='./file1\x00', 0x2, 0x4) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KDSKBLED(r0, 0x4b65, 0x1) 23:26:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000140)="f1028bae97bb3b6fe92d99f06d6e410a6684311232fa85b53b99e522450a08d4620e14cc1b0bc103eafdc3209707fced2b2ea7babe6972a7ebfe65da8e5b536e72e940d0aec55286777cbc75520a393b", 0x1c, 0x2d}, {&(0x7f00000001c0)="67510d96499900f19fb34c197d2e948088dd0eb4c5e8deb04468d504e1fed6a49f17648afb091d43ab50efabef7ee3e87a61d58966c16067b040249feeb8cea08f0044310906ec78e6b876d9b85fb2d012b9e7fc6e512d3ad165b1df879c711238e9ebf64d25a842a8d26001556698ff0c67714c5c39da3898f6e62c0526f02951b930c7104dad9dbf20c3ea7572d7aeea4126ad6fe5", 0x96, 0x3}, {&(0x7f0000000280)="93148b12a31310c063519887bfca4d68018171b7de45619edccc2cc0e03be3d193743cfcc7cf72fc13576d5030ea7feb1c5dd3bc32d704ba41cd36e6f278af8f0db7c016935890c82caa8411f577de517bc1b3cd588360d2b028fafad003654b8e46050afd0281e2788f3816c5dd24e16371d0c6643d7c7d5fb3cc912be13edb9a953d0ddda421b5bafdc27ad4babea1b05c2b5e3f3c30eaf588abcf3b12ddf9e7766d5792ff1a6c61e7d2", 0xab, 0x7f}, {&(0x7f0000000340)="3f8d368b76e728132d53cf108fc01dcd60962c5d50d50f1a9fd69e18f352b9680ef2727abaec9f99346a36b03d18045c0bda406cac894d361b8243bc4f40e082dff51adbd1b641dee204ac3095d47f1e50efdda5b766a5486e082bca", 0x5c, 0xa}, {&(0x7f00000003c0)="a113c0c9869dafbbafda26faf8c5052de5bb86c07cf0f476367ebfb1f6bbe22461fa7efc9f301c1f40fcef329f46a961d8324b0fbc70c0b3542f577e276dd4b4a56442b12681", 0x46, 0x7}, {&(0x7f0000000440)="742e429922a12b86a968bfa1bb78739ffb6b71c3edde136a29f7d8aa979f0bb6e9aa478452c1c2e05e46ecffdf8593012e75ac1da3e62c6a34922431489b5a9139ce9883596871eb9fead8307f5ff229cde50954a7d2018c98bf2959b446130869d5d7cf8b6886dc5f46d0fea51049fbdb155b153b011a77efa3b79dee98f1d1cc98ed7b98fd98f088df59", 0x8b, 0x8}, {&(0x7f0000000500)="4001cc13398d5bbb70fc8bf0cfe0c611ff21c84a9cfa54bcbd0be365e638054c5e2fd2f1380afa4e90c83c6b17c2e970486b4a55699be79e052248d933616a116166c0f41eb7621df99c27a7106a2782f2710e983e1c631a919218abd974c6f419468b21ce5508ee6c4768bb69213a7d9518f7fdc971f0cf915a4b17e278d1d5cd1e654f610bc28c395216f7743b6e6d67851b5a", 0x94, 0xb0}], 0x80000, &(0x7f0000000680)={[{@noenospc_debug='noenospc_debug'}, {@degraded='degraded'}, {@fragment_data='fragment=data'}, {@device={'device', 0x3d, './file0'}}, {@discard='discard'}, {@usebackuproot='usebackuproot'}, {@autodefrag='autodefrag'}], [{@smackfsroot={'smackfsroot'}}, {@permit_directio='permit_directio'}, {@appraise='appraise'}]}) [ 626.824690] BTRFS error (device loop5): open_ctree failed [ 626.838490] BTRFS error (device loop5): superblock checksum mismatch 23:26:20 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x9, 0x98000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000140)) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000100)={0xff, 0x7fffffff, 0x3}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 626.870345] BTRFS error (device loop5): open_ctree failed [ 626.879434] BTRFS error (device loop2): superblock checksum mismatch 23:26:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)={0x0, @aes256}) 23:26:20 executing program 0: r0 = fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xc0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=0x10001, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x0, 0x2}, 0x0, 0x0, &(0x7f00000006c0)={0x1, 0xd, 0x181}, &(0x7f0000000700)=0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x10001}}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vsock\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r2, 0x0, 0xffffffffffffff1f, &(0x7f0000000240)='.\x00', r1}, 0x30) r5 = fcntl$getown(r4, 0x9) r6 = syz_open_dev$sndctrl(&(0x7f00000002c0)='/dev/snd/controlC#\x00', 0x80, 0x20000) r7 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x101c40) r8 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/context\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r5, 0x7, r6, &(0x7f0000000380)={r7, r8, 0x2}) setsockopt$inet_udp_encap(r7, 0x11, 0x64, &(0x7f0000000580)=0x4, 0x4) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x7f}, &(0x7f0000000140)=0x8) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000005c0)=0x1) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000180)={r10, @in6={{0xa, 0x4e20, 0x100000000, @ipv4={[], [], @local}, 0x3}}}, 0x84) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000940)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r6, 0xc0505510, &(0x7f0000000500)={0x25, 0x5, 0x7, 0x0, &(0x7f00000003c0)=[{}, {}, {}, {}, {}]}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8808, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x48) [ 626.930872] BTRFS error (device loop2): open_ctree failed [ 626.946844] BTRFS error (device loop3): superblock checksum mismatch 23:26:20 executing program 0: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0xe9}], 0xf43, 0x0) [ 627.011987] BTRFS error (device loop3): open_ctree failed [ 627.020539] BTRFS error (device loop3): superblock checksum mismatch 23:26:20 executing program 0: 23:26:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xc2) r0 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x5, 0x400001) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000100), &(0x7f00000000c0)=0x40) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00'}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x8, 0x0) setxattr$security_smack_transmute(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x1) 23:26:20 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 23:26:20 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 627.100275] BTRFS error (device loop3): open_ctree failed [ 627.107285] BTRFS error (device loop5): superblock checksum mismatch [ 627.153667] BTRFS error (device loop5): open_ctree failed [ 627.171833] BTRFS error (device loop5): superblock checksum mismatch 23:26:20 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x3) keyctl$session_to_parent(0x12) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xc, 0x200) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80180, 0x0) [ 627.202078] BTRFS error (device loop5): open_ctree failed [ 627.234053] BTRFS error (device loop2): superblock checksum mismatch [ 627.244665] FAULT_INJECTION: forcing a failure. 23:26:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xd3, 0x10000}], 0xf43, 0x0) [ 627.244665] name failslab, interval 1, probability 0, space 0, times 0 [ 627.258030] CPU: 0 PID: 16139 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 627.265124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.274466] Call Trace: [ 627.277062] dump_stack+0x138/0x19c [ 627.280691] should_fail.cold+0x10f/0x159 [ 627.284832] should_failslab+0xdb/0x130 [ 627.288798] kmem_cache_alloc+0x2d7/0x780 [ 627.292936] ? wait_for_completion+0x420/0x420 [ 627.297517] __kernfs_new_node+0x70/0x420 23:26:20 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x6, 0x10000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000240)={0x0, 0x40, 0x7fff, 0x1, 0x7fffffff}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.redirect\x00', &(0x7f0000000140)=""/150, 0x96) [ 627.301658] kernfs_new_node+0x80/0xf0 [ 627.305538] __kernfs_create_file+0x46/0x323 [ 627.309940] sysfs_add_file_mode_ns+0x1e4/0x450 [ 627.314604] internal_create_group+0x232/0x7b0 [ 627.319170] sysfs_create_group+0x20/0x30 [ 627.323289] lo_ioctl+0x1176/0x1ce0 [ 627.326899] ? loop_probe+0x160/0x160 [ 627.330679] blkdev_ioctl+0x96b/0x1860 [ 627.334542] ? blkpg_ioctl+0x980/0x980 [ 627.338428] ? __might_sleep+0x93/0xb0 [ 627.342285] ? __fget+0x210/0x370 [ 627.345708] block_ioctl+0xde/0x120 [ 627.349303] ? blkdev_fallocate+0x3b0/0x3b0 [ 627.353602] do_vfs_ioctl+0x7ae/0x1060 [ 627.357467] ? selinux_file_mprotect+0x5d0/0x5d0 [ 627.362199] ? lock_downgrade+0x6e0/0x6e0 [ 627.366322] ? ioctl_preallocate+0x1c0/0x1c0 [ 627.370702] ? __fget+0x237/0x370 [ 627.374132] ? security_file_ioctl+0x89/0xb0 [ 627.378511] SyS_ioctl+0x8f/0xc0 [ 627.381847] ? do_vfs_ioctl+0x1060/0x1060 [ 627.385966] do_syscall_64+0x1e8/0x640 [ 627.389828] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 627.394654] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.399818] RIP: 0033:0x459697 [ 627.402989] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 627.410681] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 627.417927] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 627.425169] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 627.432415] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 627.439654] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 23:26:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000280)="8da4363ac0ed0000000000000001004d01000000120000000000000000000000fff6f2a2299748aeb81e1b00f318b2920efd9a000001000000000001000000000000005f42485266135f4d", 0x4b, 0xffff}], 0xf43, 0x0) [ 627.464928] BTRFS error (device loop2): open_ctree failed [ 627.478249] BTRFS error (device loop2): superblock checksum mismatch [ 627.530174] BTRFS error (device loop2): open_ctree failed [ 627.538105] BTRFS error (device loop2): superblock checksum mismatch 23:26:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf00d") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x4, &(0x7f0000000380)=[{&(0x7f0000000600)="56cfda59c4d1c073e7d4683013176b4115f6dedac9568bbb0e3b5dbcf9ce57f889e95f7015c0b4a0180a83ba5966a02efe81796bc156a227eade3e92555d835f98c8fb06b30629816f48511c780828029f5e9d", 0x53, 0x8000}, {&(0x7f00000001c0)="0376c475ed40ca6cdf07c1398a9bfe9db026541a859498203185ce75cac755f897dd675332d6051e7bebc2311a6bfb7324105f8266e7f0798442ba79a8462d3255458f2ea8d363034aca9c9941c175398363e92bc0101c9125c94130457aca0e862ff5c51339507175f3cc75911a051a34a6d5a76b5b1bc2bc1a01285b22", 0x7e, 0x1ff}, {&(0x7f0000000240)="673c3065afa29aca0f33011136b342b94763656ec19033c92fbd88d90275f96ae42d737977c2671653180ab3c93e6e842443dbd404897de4647d22d51e5f10285719a3c000fe5e6c01c8ce8fecebe3fa561e6d1f9ded88cb52700300f9a4c1ff6d883cd07f8a8a4ede5628af45abb2cf41f7bd42efb51f4c55045c791d1a5c1b99eabdbad00e4f572b53e4218b40205c6d99ef91cea235d55fd44e3965811db432b614ac601f9e1987fb0695a9c9132e0f782cd7852c0d59137e97f6ea1f48c8ee07aec4f190", 0xc6, 0xaf}, {&(0x7f0000000340), 0x0, 0x9}], 0x400, &(0x7f0000000540)={[{@degraded='degraded'}, {@fragment_metadata='fragment=metadata'}, {@space_cache_v2='space_cache=v2'}, {@space_cache='space_cache'}], [{@uid_gt={'uid>', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x65, 0x37, 0x63, 0x65, 0x37, 0x39, 0x36], 0x2d, [0x66, 0x64, 0x30, 0x63], 0x2d, [0x39, 0x66, 0x39, 0x34], 0x2d, [0x64, 0x62, 0x30, 0x37], 0x2d, [0x65, 0x39, 0x36, 0x76, 0x34, 0x35, 0x61, 0x34]}}}, {@subj_role={'subj_role', 0x3d, 'btrfs\x00'}}, {@obj_user={'obj_user', 0x3d, '{[}-#:trustedmime_type'}}]}) sendmmsg(r0, &(0x7f0000000340), 0x0, 0x2004c010) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x3ff, 0x404881) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000180)={0x800, 0x7, 0x9, 0x400}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:20 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x201080}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x20008810}, 0x4008041) [ 627.600106] protocol 88fb is buggy, dev hsr_slave_0 [ 627.605169] protocol 88fb is buggy, dev hsr_slave_1 [ 627.620115] BTRFS error (device loop2): open_ctree failed [ 627.633559] BTRFS error (device loop2): superblock checksum mismatch [ 627.670147] BTRFS error (device loop2): open_ctree failed [ 627.679330] BTRFS error (device loop2): superblock checksum mismatch 23:26:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="8da4363ac00000000000000023049ceb98f99233be92b9000000009748aeb81e000001000000000000005f4248526653504d0000000000000000000000800000000000000000068a00000000e3c5b21604e58f3b59d7b5397b51c0f6221d398ae47c6eaba42e2ba7ae8ebdaa230f2f2b6326862bf35657c1636c58944918666ca43e46d06b93a30f2068f5651088ed1a1c9b55cc469c20f5f51c5aea4bc41a518b009d0836ac1feed8cbc421a405e12234c35c5cff6cd0503222a1d4c3466f829b9b3f8c4df317e31d9ff7ecd875cebddccb0f751324d04cad4aa22956a7f5dad98c2ddadedd1610e1e0e90100", 0xed, 0x10000}], 0x0, 0x0) 23:26:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "0b7b9f7481a439ff", "0cecc746176eb35782576e381abedf9e", "9c1384d6", "a12528450af09c14"}, 0x28) r1 = fcntl$getown(0xffffffffffffffff, 0x9) move_pages(r1, 0x7, &(0x7f00000000c0)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil], &(0x7f0000000100)=[0x100000000, 0x10000], &(0x7f0000000140)=[0x0, 0x0], 0x6) 23:26:21 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x8, 0x200000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={@mcast2, 0x0}, &(0x7f0000000180)=0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_vif\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) sendto(r0, &(0x7f0000000940)="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", 0x1000, 0x4000000, &(0x7f00000001c0)=@xdp={0x2c, 0x6, r1, 0x29}, 0x80) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 627.720221] BTRFS error (device loop2): open_ctree failed [ 627.740598] BTRFS error (device loop2): superblock checksum mismatch 23:26:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xeb, 0x0, &(0x7f0000000000), 0xe41, 0x0) 23:26:21 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x400800, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000100)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000140)="5e114ae816fb65d9060bba61cd18e420f7017169f6ad8a5279d46f6ed75cce01c9a86c581b07dd7495b9303b36f9347ade39cad9e925973c994bdd8fe28a4d04821b433f7c1f1fd151f63882b974af421d0d2fff87527c937e15f652fe7c0f3309f03d9f9cbbc7b6fde5299fb6131a8afe2acef2c94a0521f6a6ca38b432488f23b4a5245bd7c567352e655fc15b35cfd7c6e1c460d0830d80232ff4c278af7c5ed97a16f3ba37e1f0793c3f3488f2a7bb68255cd3479d92c8bc886c057eb8d6b90f1ef5", 0xc4}], 0x1, &(0x7f0000000280)=[@dstaddrv6={0x20, 0x84, 0x8, @rand_addr="31bb8d8bcb162e1261bce9b5de9c0e0e"}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x40, 0x10}, 0x20040004) 23:26:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/77) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x761100) [ 627.890363] BTRFS error (device loop2): open_ctree failed [ 627.923288] BTRFS error (device loop2): superblock checksum mismatch [ 627.960525] FAULT_INJECTION: forcing a failure. [ 627.960525] name failslab, interval 1, probability 0, space 0, times 0 [ 627.971964] CPU: 1 PID: 16208 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 627.979050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.988379] Call Trace: [ 627.990946] dump_stack+0x138/0x19c [ 627.994549] should_fail.cold+0x10f/0x159 [ 627.998698] should_failslab+0xdb/0x130 [ 628.002646] kmem_cache_alloc+0x47/0x780 [ 628.006681] ? save_stack_trace+0x16/0x20 [ 628.010801] ? save_stack+0x45/0xd0 [ 628.014867] ? kasan_kmalloc+0xce/0xf0 [ 628.018727] ? kasan_slab_alloc+0xf/0x20 [ 628.022758] ? kmem_cache_alloc+0x12e/0x780 [ 628.027051] ? __kernfs_new_node+0x70/0x420 [ 628.031352] ? kernfs_new_node+0x80/0xf0 [ 628.035383] ? __kernfs_create_file+0x46/0x323 [ 628.039936] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 628.045532] idr_get_free_cmn+0x563/0x8d0 [ 628.049656] idr_alloc_cmn+0x10e/0x210 [ 628.053525] ? __fprop_inc_percpu_max+0x1e0/0x1e0 [ 628.058342] ? __lock_is_held+0xb6/0x140 [ 628.062376] ? check_preemption_disabled+0x3c/0x250 [ 628.067365] idr_alloc_cyclic+0xd0/0x1e2 [ 628.071398] ? ida_simple_remove+0x60/0x60 [ 628.075608] __kernfs_new_node+0xe4/0x420 [ 628.079730] kernfs_new_node+0x80/0xf0 [ 628.083589] __kernfs_create_file+0x46/0x323 [ 628.087968] sysfs_add_file_mode_ns+0x1e4/0x450 [ 628.092611] internal_create_group+0x232/0x7b0 [ 628.097170] sysfs_create_group+0x20/0x30 [ 628.101290] lo_ioctl+0x1176/0x1ce0 [ 628.104888] ? loop_probe+0x160/0x160 [ 628.108661] blkdev_ioctl+0x96b/0x1860 [ 628.112527] ? blkpg_ioctl+0x980/0x980 [ 628.116388] ? __might_sleep+0x93/0xb0 [ 628.120246] ? __fget+0x210/0x370 [ 628.123674] block_ioctl+0xde/0x120 [ 628.127271] ? blkdev_fallocate+0x3b0/0x3b0 [ 628.131564] do_vfs_ioctl+0x7ae/0x1060 [ 628.135422] ? selinux_file_mprotect+0x5d0/0x5d0 [ 628.140149] ? lock_downgrade+0x6e0/0x6e0 [ 628.144270] ? ioctl_preallocate+0x1c0/0x1c0 [ 628.148649] ? __fget+0x237/0x370 [ 628.152079] ? security_file_ioctl+0x89/0xb0 [ 628.156459] SyS_ioctl+0x8f/0xc0 [ 628.159795] ? do_vfs_ioctl+0x1060/0x1060 [ 628.163914] do_syscall_64+0x1e8/0x640 [ 628.167772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 628.172589] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 628.177751] RIP: 0033:0x459697 [ 628.180912] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 628.188590] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 628.195833] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 628.203075] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:26:21 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000100)=0x1, 0x4) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 628.210317] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 628.217559] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 [ 628.230578] BTRFS error (device loop2): open_ctree failed 23:26:21 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x1, 0x0) fchmod(r0, 0x20) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0x4) [ 628.270190] BTRFS error (device loop5): superblock checksum mismatch 23:26:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0)={0x3, [0x6, 0x40, 0xd3b2]}, 0xa) 23:26:21 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) llistxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=""/193, 0xc1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 628.340282] BTRFS error (device loop5): open_ctree failed [ 628.359333] BTRFS: device fsid fff69206-0000-0000-b81e-1b00920efd9a devid 0 transid 0 /dev/loop1 [ 628.375504] BTRFS error (device loop3): superblock checksum mismatch 23:26:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x200000) open$dir(&(0x7f0000000140)='./file0\x00', 0x400000, 0x25) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000100)=0xb3, 0x4) 23:26:21 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x410100, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/224, 0xe0}, {&(0x7f0000000280)=""/80, 0x50}], 0x2, &(0x7f0000000340)=""/169, 0xa9}, 0x3) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 628.390365] BTRFS error (device loop1): superblock checksum mismatch [ 628.453499] BTRFS error (device loop3): open_ctree failed [ 628.461922] BTRFS error (device loop2): superblock checksum mismatch 23:26:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0xa02, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000100)) 23:26:21 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x2, 0x8000) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000480)={0x2c, @loopback, 0x4e21, 0x5, 'nq\x00', 0x12, 0xbc1, 0x4c}, 0x2c) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1f, 0x200000) [ 628.493643] BTRFS error (device loop1): open_ctree failed [ 628.520514] BTRFS error (device loop2): open_ctree failed [ 628.529569] BTRFS error (device loop2): superblock checksum mismatch 23:26:21 executing program 1: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:21 executing program 0: chroot(&(0x7f00000000c0)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 628.611225] BTRFS error (device loop2): open_ctree failed [ 628.618714] BTRFS error (device loop5): superblock checksum mismatch [ 628.685693] FAULT_INJECTION: forcing a failure. [ 628.685693] name failslab, interval 1, probability 0, space 0, times 0 [ 628.700041] BTRFS error (device loop5): open_ctree failed [ 628.709064] BTRFS error (device loop5): superblock checksum mismatch [ 628.713084] CPU: 1 PID: 16280 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 628.722659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.722663] Call Trace: [ 628.722678] dump_stack+0x138/0x19c [ 628.722696] should_fail.cold+0x10f/0x159 [ 628.722712] should_failslab+0xdb/0x130 [ 628.722723] kmem_cache_alloc+0x2d7/0x780 [ 628.722731] ? wait_for_completion+0x420/0x420 [ 628.722746] __kernfs_new_node+0x70/0x420 [ 628.759061] kernfs_new_node+0x80/0xf0 [ 628.762922] __kernfs_create_file+0x46/0x323 [ 628.767303] sysfs_add_file_mode_ns+0x1e4/0x450 [ 628.771946] internal_create_group+0x232/0x7b0 [ 628.776504] sysfs_create_group+0x20/0x30 [ 628.780631] lo_ioctl+0x1176/0x1ce0 [ 628.784232] ? loop_probe+0x160/0x160 [ 628.788003] blkdev_ioctl+0x96b/0x1860 [ 628.791859] ? blkpg_ioctl+0x980/0x980 [ 628.795723] ? __might_sleep+0x93/0xb0 [ 628.799584] ? __fget+0x210/0x370 [ 628.803009] block_ioctl+0xde/0x120 [ 628.806608] ? blkdev_fallocate+0x3b0/0x3b0 [ 628.810899] do_vfs_ioctl+0x7ae/0x1060 [ 628.814763] ? selinux_file_mprotect+0x5d0/0x5d0 [ 628.819491] ? lock_downgrade+0x6e0/0x6e0 [ 628.823611] ? ioctl_preallocate+0x1c0/0x1c0 [ 628.827989] ? __fget+0x237/0x370 [ 628.831419] ? security_file_ioctl+0x89/0xb0 [ 628.835797] SyS_ioctl+0x8f/0xc0 [ 628.839132] ? do_vfs_ioctl+0x1060/0x1060 [ 628.843257] do_syscall_64+0x1e8/0x640 [ 628.847124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 628.851968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 628.857130] RIP: 0033:0x459697 [ 628.860290] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 628.867967] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 628.875208] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 23:26:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0xf83a8a88a25c98ea, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1800004}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x94, r2, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1888}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa166}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x10100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r4}}, 0x10) 23:26:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xcef, 0x4000) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) [ 628.882450] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 628.889689] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 628.897016] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 [ 628.921595] BTRFS error (device loop5): open_ctree failed 23:26:22 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syslog(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, &(0x7f0000000180)=""/66, 0x42}, 0xa287ad5100d85399) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x6, &(0x7f0000000640)=[{&(0x7f00000002c0)="76c447305066129da51a43e59ebbe9bb72f2074544535c3a6ae2c25a1c798ebf945a775eca4eda619e8147b5d4382414989be1b48da102bf7aa67f07baa8a8d015af00b1463e342a9313ff46b9e3d3e6a1056386b204836c7cc5b764a57725e2ca65e51413e383c331da002cc1cf4641b8cc237d802534781ec94003eb6f4b3542d172826615912bbe8cb7a708b959814323f4fba9e8908a829d71", 0x9b, 0x400}, {&(0x7f0000000380)="5b92968dd1755c089cbc1001603cfd7d074628cd0d045e225044a587193e3a91609b3a85d8efc13ccd26ac32482e56cd4bb564cdc186cc0a58fd5074dd467f568684ee65d3a92af2e0180f8e2cb3e56570ad9a0e3edfa4739efdce9f7ad61cf9daa6b6419250d9ed7a87baa3b65038154c75af37522b350e79121e53b90b7e9bbe6a3c058cb0b0962790972304c07552f9ad034e8cae8f13285f16976679cca5c0a3314c548582ceddc1d520a7c9bf09df7638c9cb88ed5c1d2a6daef28171b1d6320d9816f2c138f1f3a38aac9e", 0xce, 0x10000}, {&(0x7f0000000480)="70a7690fc51a8fe42fc50f64a5fef1090a73f1ab120f5ddb176bb419c29fb641185fab1be2c5a904a888dee19ccd3800ccf11c67467a1bda883c28717211ee03225ea0d5406a150625cd56c53afaf665cf43b795adaf9583597cc121130a376857e1a945744f7f70092f71d83fe4652091ac5ebb4ac8289391c8e461a1492cc88829666258d072d83b13017b6ae46e882db001ba39916fa3ef77d813a0851647468a8eda0f8c7564ab008ce60448", 0xae, 0x3f}, {&(0x7f0000000540)="db24ed152e0985399392f0ca87f8dde910b873a08154d75b40b6894816f0c4627ae7864073", 0x25, 0x8}, {&(0x7f0000000580)="5d4be5eefa0f6ff213dde40f6e8c1806e6e0a1fac7b604336c", 0x19, 0x5}, {&(0x7f00000005c0)="b338e523fca809f466b0b0f5ce83a9cb7ea760fc4372d0c8cedf4c7df9c4b31bc2c0c20f0f2155a0deadd59ffcfbfb3292bce8292fb6ad0c4a5d62849da54417fe31ab602fed6bc0eca24d111bc4f1a5e18d0c8e92874a02cee3033af9503e8fedd87f2218e96e0decdf9fc2df70103a2a8898447a19f1bffb5bdd563e892e", 0x7f, 0x5}], 0x4d70c52408d8c4a6, &(0x7f0000001940)={[{@space_cache_v2='space_cache=v2'}, {@subvolid={'subvolid', 0x3d, 0x200}}, {@discard='discard'}, {@flushoncommit='flushoncommit'}, {@nossd_spread='nossd_spread'}, {@rescan_uuid_tree='rescan_uuid_tree'}, {@skip_balance='skip_balance'}], [{@euid_eq={'euid', 0x3d, r1}}, {@smackfshat={'smackfshat', 0x3d, 'btrfs\x00'}}, {@hash='hash'}]}) [ 628.933181] BTRFS error (device loop5): superblock checksum mismatch 23:26:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ptrace$setsig(0x4203, 0x0, 0x80, &(0x7f0000000140)={0x37, 0x81, 0x6}) 23:26:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getrlimit(0x98afa385b45c5ed3, &(0x7f00000000c0)) 23:26:22 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) llistxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=""/193, 0xc1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000200)='reiserfs\x00', &(0x7f0000000240)='./file0\x00', 0x1ff, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000280)="2b84a4bc635788d49c8f7668e4b67f0fe1c3b9d111064fe2c9e9cacb0863", 0x1e, 0x4a7b9c24}, {&(0x7f00000002c0)="3dd40e2f8f33ab0132938d587873ed2fa849f721dbb4e485f6416f319a4a41ea1f211f9fee1299da97edd619c9cf825683b679409dcc23d8ad284946a1418b4a36829e266f4c5d32b9105c72391ccb58e4503d1b288884dd474bc95b11accbe403d549beca9160357f83375361ec33b9de1753583cb297bbaca93ff1fd8d62a75a157445365e0a5f7ad03694622cbed8630c177ebc9d6ad47adcec6422", 0x9d, 0x8}, {&(0x7f0000000940)="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", 0x1000, 0x20}, {&(0x7f0000000380)="130dc6c401e8a0a891e8397b78595ff282319db9461d434b1c9537946567806801e4", 0x22, 0x81}, {&(0x7f00000003c0)="ab103683871564aca923eac4e4a4bcd375dbe5213aac71cb833aaa3fc3a8dd73e2152ebcac558a353c7daf03584a221aba3d39e2a205d32910080c64551b30451955172f7ed9786136affc9439d10a1702dbea4a8027b2d9525be794db0ec71aec372fa1b616b73180e144df3b58081cbdc775b46d9e547c39be90a2cc21352addeb586ce0cb65937d75a52478cfa52ce4a432a2df19bb7ec2057464ffb255f569b1888e098d0b48ad03aa0cf8966ebaed39a41e5f748bce91ef9386ba82e71115a60a27acca2504ad15f19d00fed00ce3d9cea5d28a60e5", 0xd8, 0xfffffffffffffffa}, {&(0x7f00000004c0)="fb30713e059cc82226f34859f56ef48504ac1c48b6c61ba46506e63110297600efde84c798e5eef8576d374328e5634b9376aac3335d8a17c6d49aa7fdf15513844087d0ee1377b5b97a86c6a39b0b37f602ac5beb1599c06bf3a9ed4f909e433775fd5478e8e00803bb332d49752ac52165fdd18feb7526755ba63ea7499a674f351d4aa23cefc05f06f45aae4bab758962e6ffc05a83b0800717a10173808edc8627554ccc967de9ee256691b5864a7636bacf2516edc1895f9a75e6ade9a7188796171b144930b05caf398196be2dc7d28dabba9ba065bd6327696646552cb9a78258a623f4adbfe15482a703c01205b8ec", 0xf3, 0x8}], 0x10, &(0x7f0000000680)={[{@errors_continue='errors=continue'}, {@grpquota='grpquota'}, {@tails_on='tails=on'}, {@conv='conv'}], [{@fsmagic={'fsmagic', 0x3d, 0x100}}, {@smackfsfloor={'smackfsfloor', 0x3d, '$'}}, {@hash='hash'}]}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000180)=0x1f, 0x4) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000100)={0x2, 0x2}, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sync() syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xaa, 0x840) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) [ 629.040399] BTRFS error (device loop5): open_ctree failed [ 629.051784] BTRFS error (device loop5): superblock checksum mismatch [ 629.090347] BTRFS error (device loop5): open_ctree failed [ 629.098015] BTRFS error (device loop5): superblock checksum mismatch 23:26:22 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x200, 0x1) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000100)=0x2) 23:26:22 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200040, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x80000001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, 0xffffffffffffffe0, 0x3ff, 0x3a18, 0x7, 0x1712}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="81002c686361aa634866ff03"], &(0x7f0000000240)=0x10) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 629.171288] BTRFS error (device loop5): open_ctree failed [ 629.183730] BTRFS error (device loop2): superblock checksum mismatch [ 629.239996] FAULT_INJECTION: forcing a failure. [ 629.239996] name failslab, interval 1, probability 0, space 0, times 0 [ 629.251547] BTRFS error (device loop2): open_ctree failed [ 629.263686] CPU: 0 PID: 16336 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 629.270781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.270786] Call Trace: [ 629.270803] dump_stack+0x138/0x19c [ 629.270821] should_fail.cold+0x10f/0x159 [ 629.270836] should_failslab+0xdb/0x130 [ 629.270847] kmem_cache_alloc+0x2d7/0x780 [ 629.270855] ? wait_for_completion+0x420/0x420 [ 629.270871] __kernfs_new_node+0x70/0x420 [ 629.270883] kernfs_new_node+0x80/0xf0 [ 629.270895] __kernfs_create_file+0x46/0x323 [ 629.270907] sysfs_add_file_mode_ns+0x1e4/0x450 [ 629.270920] internal_create_group+0x232/0x7b0 [ 629.270935] sysfs_create_group+0x20/0x30 [ 629.270945] lo_ioctl+0x1176/0x1ce0 [ 629.270957] ? loop_probe+0x160/0x160 [ 629.282853] blkdev_ioctl+0x96b/0x1860 [ 629.282862] ? blkpg_ioctl+0x980/0x980 [ 629.282878] ? __might_sleep+0x93/0xb0 [ 629.282887] ? __fget+0x210/0x370 [ 629.282898] block_ioctl+0xde/0x120 [ 629.282907] ? blkdev_fallocate+0x3b0/0x3b0 [ 629.300461] BTRFS error (device loop2): superblock checksum mismatch [ 629.303249] do_vfs_ioctl+0x7ae/0x1060 [ 629.303262] ? selinux_file_mprotect+0x5d0/0x5d0 [ 629.303272] ? lock_downgrade+0x6e0/0x6e0 [ 629.303281] ? ioctl_preallocate+0x1c0/0x1c0 [ 629.303291] ? __fget+0x237/0x370 [ 629.303307] ? security_file_ioctl+0x89/0xb0 [ 629.390544] SyS_ioctl+0x8f/0xc0 [ 629.393883] ? do_vfs_ioctl+0x1060/0x1060 [ 629.398005] do_syscall_64+0x1e8/0x640 [ 629.401861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 629.406676] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 629.411836] RIP: 0033:0x459697 [ 629.414998] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 629.422677] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 629.429919] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 23:26:22 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='ip6erspan0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 629.437159] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 629.444399] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 629.451642] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 23:26:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x8000) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000100)={0x0, 0x8001, 0xe3a5}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000002c0)={0x9, 'syz1\x00'}) mount$9p_xen(0xfffffffffffffffe, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x40000, &(0x7f0000000200)={'trans=xen,', {[{@cache_none='cache=none'}, {@cache_loose='cache=loose'}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, 'trustedvboxnet1nodev'}}, {@cachetag={'cachetag', 0x3d, 'btrfs\x00'}}, {@version_L='version=9p2000.L'}, {@version_9p2000='version=9p2000'}, {@version_L='version=9p2000.L'}, {@loose='loose'}], [{@subj_user={'subj_user', 0x3d, '/proc/thread-self/attr/current\x00'}}]}}) 23:26:22 executing program 0: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/member\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x3) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80000) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000140)={0x40, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 629.501073] BTRFS error (device loop2): open_ctree failed [ 629.512381] BTRFS error (device loop2): superblock checksum mismatch 23:26:22 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) llistxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=""/193, 0xc1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:22 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x2, 0x7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0xb48b}, &(0x7f0000000180)=0x8) madvise(&(0x7f0000a60000/0x3000)=nil, 0x3000, 0x13) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 629.551276] BTRFS error (device loop2): open_ctree failed [ 629.558465] BTRFS error (device loop2): superblock checksum mismatch 23:26:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/4096, 0x1000, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x14000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x0, 0xfff, 0x100000001}, 0x10) 23:26:23 executing program 2: r0 = socket(0x8, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ifb0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@ipv4={[], [], @broadcast}, 0x1c, r1}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 629.607349] BTRFS error (device loop2): open_ctree failed [ 629.615089] BTRFS error (device loop2): superblock checksum mismatch [ 629.638568] REISERFS warning (device loop5): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 629.638568] 23:26:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x5, 0x200) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0xc5f, 0x2, [0xd6, 0x8]}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x6, 0x1, 0x6, r1}, 0x10) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000280)={0x8, 0x0, &(0x7f00000001c0)="dcd671aee8061962539a104230bf4e30836648a4c6061f886ddff404371f943cdfb939e7a786616a223dbe042a7904792550647ddf835b81e5948bb18c652b0369ae6fe93b43551dc7df331c9481944b34d59af45e88e8dccc4ba4b83c956963e17e8d42cfecf71564809e526be7d6bf961bd66a410945016d5c878c8d6c4e6edec15e31dcae2dcdb029692e13ad871053e8", {0xfffffffffffffff9, 0x8, 0x797d4777, 0x9, 0x0, 0xffffffffffff62fb, 0x6, 0x5}}) [ 629.680931] BTRFS error (device loop2): open_ctree failed [ 629.697565] BTRFS error (device loop2): superblock checksum mismatch [ 629.750406] BTRFS error (device loop2): open_ctree failed [ 629.768235] BTRFS error (device loop2): superblock checksum mismatch 23:26:23 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) finit_module(r0, &(0x7f0000000100)='btrfs\x00', 0x0) 23:26:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000000700)=[{&(0x7f0000000180)="426f6ce56b875959232800530168b523dbb334c292f4cf33dc3102e34f3459e11dc57f31fbd33f753c05e91894cf9a8fea31cf408e7713ab27919ff18e2164e139f8a4015efe2ceafe0ae396b31fb4cd9a1287af4d979d24", 0x58, 0x835}, {&(0x7f0000000200)="f7676ac1f92e792a29337444e35a263f4a45a4b9e4d6c1f260c557af83ea5a72c95985e58d4e3500abd2ad1c1a5e6efa", 0x30, 0x23c2}, {&(0x7f0000000380)="0358cbd33b0fa409f2b327d3f93dd069a0dd41726aea0eea7397ab6d259ef42a32b7ac7d15e7e712207e56af25729379d6d16eeee14331c72824868f561dd0fc44b99da88647bbc078c7b8a0f315e1df22893053377d6f85536323499093061b5fc5fefb2b7f4c2a66768a563d18a9701eb276afc434db1a", 0x78, 0x1}, {&(0x7f0000000400)="bf6a9062261b0667e9f3e8387030e6a763324018fe6cafcfc78a0e12d69ae8870bafe5999da3d5b3", 0x28}, {&(0x7f0000000440)="71f1156c4a4973ff1f163c93316e1b6520b9fa25f653759e611d2cd9bee4ab03d320eeb8e9686f25ab1e721d09135aa064912575db42be4760ed2da3b67189077db0139717117c4d6c048a500c813e4da0841209bdfbe2049019d23e8ef396da3ab8d132eecedc1de8c16b203a98cad71850e2488f49e722adde5cb5ebb9c89577b97e71530b95918873f3f9f676f366413ef8826d8baba939b23931862612219a18742ff6d2130b332ebe5f60e0205f4762f32c9481b934ae15a647917ca7242fa14933f0bf57c698268f7338355a01960731083e0cea1a1ca2d4cb5ca02bc7910ad023cb2f35a5dd1a1663bbdb03b7bc868116bde568", 0xf7, 0x653}, {&(0x7f0000000540)="b4894926275805449029e343b98591528dc16dafb9b6596ba77095b6596e6f67896f1e00a988373155ed5fb5efe68f520879d0d6aee8a0207f5de85a0efd7235342bb4600d11fed5d700d8cb47117a959f14f5d010b67eac6b31754f1764d500c038e0a4cf83925127b6", 0x6a, 0x1}, {&(0x7f00000005c0)="255f361fc64388a9bb9a9965c2fe4c5c333c6ece942dc666c23277de198ded263d69cbc6d5ef176e01422ef622c5145d5856f167da451f5c005c65", 0x3b, 0x80000001}, {&(0x7f0000000600)="e1b81525e2e632591df1c8e840349efe6cc81e21ad52b5b71b9c4e6158f5b106a73fd8b8a5e6225ea7ed7a6cd99ff7204f1c", 0x32, 0x8}, {&(0x7f0000000640)="fcc4d6c36ecb5177f16555e1cf03aff1e596de10b26af463d75f73524c96feb79743ca7a884452a6a52fab07b33a81d22e02713f371d73ee9173be55fc03f50f972ed119d1441bb0ef21243e25cfe6d68ef3844891cf425db767ab8e6fbef5f7847ee51ac55204e3c503dc6ed63ee03f826cab0b5f3f440fd695e8fe62e36b7d858efbe62f34196ee4af7e0175dbe304b4af58f40ec8a5457261fbc7c4aef306278f71d20f7f2d15f51af40a79a300e5963e00bd547a481441f4a1be0e", 0xbd}], 0x48, &(0x7f0000000800)=ANY=[@ANYBLOB="737061635c655f63616368653d76322c636f6d6d69743d30783030303030303030303030d36c1b9a312c636f6d70726573732c646f6e745f686173682c"]) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000240)="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"/311, 0x137, 0x10000}], 0x40000, 0x0) r0 = semget$private(0x0, 0x3, 0x100) openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x400, 0x0) r1 = eventfd2(0x8, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000900)='/dev/audio\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r3, 0x80045530, &(0x7f0000000940)=""/20) r4 = dup3(r2, r1, 0x997d6ca682392ce7) bind$vsock_dgram(r4, &(0x7f0000000840)={0x28, 0x0, 0x0, @my=0x1}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000980)='nbd\x00') semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000080)=""/17) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000880)={'yam0\x00', {0x2, 0x4e23, @multicast2}}) 23:26:23 executing program 2: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100)=0x1, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:23 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x800, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000180)=0x36d27756) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0x900c0, 0x0) dup3(r1, r2, 0x80000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:23 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) llistxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=""/193, 0xc1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 629.920114] BTRFS error (device loop2): open_ctree failed [ 629.964424] FAULT_INJECTION: forcing a failure. [ 629.964424] name failslab, interval 1, probability 0, space 0, times 0 [ 629.976086] BTRFS error (device loop1): superblock checksum mismatch [ 629.985727] CPU: 0 PID: 16401 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 629.992825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.002166] Call Trace: [ 630.004202] audit: type=1400 audit(1566343583.311:387): avc: denied { module_load } for pid=16395 comm="syz-executor.1" path="/selinux/validatetrans" dev="selinuxfs" ino=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=system permissive=1 [ 630.004745] dump_stack+0x138/0x19c [ 630.004762] should_fail.cold+0x10f/0x159 [ 630.004775] should_failslab+0xdb/0x130 [ 630.043388] kmem_cache_alloc+0x2d7/0x780 [ 630.047523] ? wait_for_completion+0x420/0x420 [ 630.047540] __kernfs_new_node+0x70/0x420 [ 630.056224] kernfs_new_node+0x80/0xf0 [ 630.056237] __kernfs_create_file+0x46/0x323 23:26:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) 23:26:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = creat(&(0x7f00000000c0)='\x00', 0x40) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000140)={0x100, @dev={[], 0x24}}) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000100)) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000003c0)=ANY=[@ANYBLOB="03000000000000000001000003000000000000000000000003000000357300000000000000000000000000000000000000000000000000f48f184371f60543000000000000000000ff0000000000000008000000000000000900000000000000020000000700000006000000040000000000000000000000450000007c08000000000000000000000000000000000000000000000000000083fed510d2"]) ioctl$TIOCCONS(r0, 0x541d) recvfrom$netrom(r0, &(0x7f00000002c0)=""/231, 0xe7, 0x120, &(0x7f0000000180)={{0x3, @null, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 23:26:23 executing program 0: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:23 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x30006, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0x5}, 0x0, 0x0, &(0x7f0000000300)={0x3, 0x5, 0x10000, 0x401}, &(0x7f0000000340)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x3}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=r1, 0x4) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000200), &(0x7f0000000240)=0x1a6) ioctl(r2, 0x7, &(0x7f0000000940)="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") sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="00000000de094fe7939e4e79f16e282d4115cd06936c9988124a3388394e0e78083626719421fed38506d7db6180df5ec54d62f25738e3dfccda885c0916c1b585498c00d219d5224b5a2a86a759777b24f6dc4eb17b724e36feb374393a65dbb5c3930dbf34e3d380ec30563b963f519623e02a33754ad55daceef8bdfd313e81cdc7acf2c766e24ae1cffecd83d4bfda17547ba762b21974b8cffd9d90057d64b1dfe4626508f4adbd75b679511c87ed78bb704a4ca504a20d8c1cef425cdb4386031054ba58ea9c5eaf20bae90ae662444a0457a0ac26324f"], 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfffffffffffffdad, 0x10000}], 0xf43, 0x0) dup2(r0, r2) [ 630.056248] sysfs_add_file_mode_ns+0x1e4/0x450 [ 630.056262] internal_create_group+0x232/0x7b0 [ 630.073721] sysfs_create_group+0x20/0x30 [ 630.077858] lo_ioctl+0x1176/0x1ce0 [ 630.081482] ? loop_probe+0x160/0x160 [ 630.085270] blkdev_ioctl+0x96b/0x1860 [ 630.089152] ? blkpg_ioctl+0x980/0x980 [ 630.093035] ? __might_sleep+0x93/0xb0 [ 630.096911] ? __fget+0x210/0x370 [ 630.100356] block_ioctl+0xde/0x120 [ 630.103973] ? blkdev_fallocate+0x3b0/0x3b0 [ 630.108282] do_vfs_ioctl+0x7ae/0x1060 [ 630.112169] ? selinux_file_mprotect+0x5d0/0x5d0 [ 630.116912] ? lock_downgrade+0x6e0/0x6e0 [ 630.121052] ? ioctl_preallocate+0x1c0/0x1c0 [ 630.125452] ? __fget+0x237/0x370 [ 630.128898] ? security_file_ioctl+0x89/0xb0 [ 630.133298] SyS_ioctl+0x8f/0xc0 [ 630.136653] ? do_vfs_ioctl+0x1060/0x1060 [ 630.140795] do_syscall_64+0x1e8/0x640 [ 630.144674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 630.149507] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.154684] RIP: 0033:0x459697 [ 630.157863] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 630.165566] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 630.172817] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 630.180069] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 630.187324] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 630.194583] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 23:26:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x195300, 0x0) gettid() r1 = gettid() ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f00000001c0)=0x7ff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x81, 0x2, 0x7, 0x6, 0x0, 0xc4, 0x41020, 0x8, 0xc7aa, 0x2, 0x9, 0x5, 0x6, 0x3, 0x5, 0x5, 0xfff, 0x5, 0xff, 0x3, 0x6, 0x1, 0x6dd6, 0xffffffffffffffe0, 0x0, 0x0, 0x5, 0x400, 0xff43, 0x100000001, 0x6e, 0x6, 0x1, 0x6, 0x0, 0x401, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0xb6e25e1fee81d6cf}, 0x10000, 0x3, 0x8, 0x3, 0x100, 0x70}, r1, 0x6, r0, 0x1) 23:26:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000200)='reiserfs\x00', &(0x7f0000000240)='./file0\x00', 0x1ff, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000280)="2b84a4bc635788d49c8f7668e4b67f0fe1c3b9d111064fe2c9e9cacb0863", 0x1e, 0x4a7b9c24}, {&(0x7f00000002c0)="3dd40e2f8f33ab0132938d587873ed2fa849f721dbb4e485f6416f319a4a41ea1f211f9fee1299da97edd619c9cf825683b679409dcc23d8ad284946a1418b4a36829e266f4c5d32b9105c72391ccb58e4503d1b288884dd474bc95b11accbe403d549beca9160357f83375361ec33b9de1753583cb297bbaca93ff1fd8d62a75a157445365e0a5f7ad03694622cbed8630c177ebc9d6ad47adcec6422", 0x9d, 0x8}, {&(0x7f0000000940)="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", 0x1000, 0x20}, {&(0x7f0000000380)="130dc6c401e8a0a891e8397b78595ff282319db9461d434b1c9537946567806801e4", 0x22, 0x81}, {&(0x7f00000003c0)="ab103683871564aca923eac4e4a4bcd375dbe5213aac71cb833aaa3fc3a8dd73e2152ebcac558a353c7daf03584a221aba3d39e2a205d32910080c64551b30451955172f7ed9786136affc9439d10a1702dbea4a8027b2d9525be794db0ec71aec372fa1b616b73180e144df3b58081cbdc775b46d9e547c39be90a2cc21352addeb586ce0cb65937d75a52478cfa52ce4a432a2df19bb7ec2057464ffb255f569b1888e098d0b48ad03aa0cf8966ebaed39a41e5f748bce91ef9386ba82e71115a60a27acca2504ad15f19d00fed00ce3d9cea5d28a60e5", 0xd8, 0xfffffffffffffffa}, {&(0x7f00000004c0)="fb30713e059cc82226f34859f56ef48504ac1c48b6c61ba46506e63110297600efde84c798e5eef8576d374328e5634b9376aac3335d8a17c6d49aa7fdf15513844087d0ee1377b5b97a86c6a39b0b37f602ac5beb1599c06bf3a9ed4f909e433775fd5478e8e00803bb332d49752ac52165fdd18feb7526755ba63ea7499a674f351d4aa23cefc05f06f45aae4bab758962e6ffc05a83b0800717a10173808edc8627554ccc967de9ee256691b5864a7636bacf2516edc1895f9a75e6ade9a7188796171b144930b05caf398196be2dc7d28dabba9ba065bd6327696646552cb9a78258a623f4adbfe15482a703c01205b8ec", 0xf3, 0x8}], 0x10, &(0x7f0000000680)={[{@errors_continue='errors=continue'}, {@grpquota='grpquota'}, {@tails_on='tails=on'}, {@conv='conv'}], [{@fsmagic={'fsmagic', 0x3d, 0x100}}, {@smackfsfloor={'smackfsfloor', 0x3d, '$'}}, {@hash='hash'}]}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000180)=0x1f, 0x4) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000100)={0x2, 0x2}, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sync() syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xaa, 0x840) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) [ 630.220142] BTRFS error (device loop1): open_ctree failed [ 630.228140] BTRFS error (device loop1): superblock checksum mismatch [ 630.280843] BTRFS error (device loop1): open_ctree failed [ 630.289384] BTRFS error (device loop1): superblock checksum mismatch [ 630.340660] BTRFS error (device loop1): open_ctree failed [ 630.348370] BTRFS error (device loop1): superblock checksum mismatch [ 630.401887] BTRFS error (device loop1): open_ctree failed [ 630.410366] BTRFS error (device loop1): superblock checksum mismatch [ 630.510170] BTRFS error (device loop1): open_ctree failed [ 630.518329] BTRFS error (device loop5): superblock checksum mismatch 23:26:23 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x92c84d6ab985bb64) socket$isdn_base(0x22, 0x3, 0x0) 23:26:23 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:23 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x402200, 0x80) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000100), 0x4) [ 630.610298] BTRFS error (device loop5): open_ctree failed [ 630.627929] FAULT_INJECTION: forcing a failure. [ 630.627929] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 630.632474] BTRFS error (device loop2): superblock checksum mismatch [ 630.639823] CPU: 0 PID: 16463 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 630.639829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.639833] Call Trace: [ 630.639848] dump_stack+0x138/0x19c [ 630.639863] should_fail.cold+0x10f/0x159 [ 630.639880] __alloc_pages_nodemask+0x1d6/0x7a0 [ 630.653428] ? __alloc_pages_slowpath+0x2930/0x2930 [ 630.653449] cache_grow_begin+0x80/0x400 [ 630.653461] kmem_cache_alloc_trace+0x6b2/0x790 [ 630.653471] ? kernfs_put+0x35e/0x490 [ 630.653484] ? devm_device_remove_groups+0x50/0x50 [ 630.700063] kobject_uevent_env+0x378/0xc23 [ 630.704358] ? internal_create_group+0x49a/0x7b0 [ 630.709092] kobject_uevent+0x20/0x26 [ 630.712865] lo_ioctl+0x11e7/0x1ce0 [ 630.716467] ? loop_probe+0x160/0x160 [ 630.720241] blkdev_ioctl+0x96b/0x1860 [ 630.724098] ? blkpg_ioctl+0x980/0x980 [ 630.727961] ? __might_sleep+0x93/0xb0 [ 630.731821] ? __fget+0x210/0x370 [ 630.735249] block_ioctl+0xde/0x120 [ 630.738848] ? blkdev_fallocate+0x3b0/0x3b0 [ 630.743143] do_vfs_ioctl+0x7ae/0x1060 [ 630.747001] ? selinux_file_mprotect+0x5d0/0x5d0 [ 630.751728] ? lock_downgrade+0x6e0/0x6e0 [ 630.755849] ? ioctl_preallocate+0x1c0/0x1c0 [ 630.760228] ? __fget+0x237/0x370 [ 630.763658] ? security_file_ioctl+0x89/0xb0 [ 630.768038] SyS_ioctl+0x8f/0xc0 [ 630.771373] ? do_vfs_ioctl+0x1060/0x1060 [ 630.775675] do_syscall_64+0x1e8/0x640 [ 630.779536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 630.784526] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.789687] RIP: 0033:0x459697 [ 630.792849] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 630.800528] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 23:26:24 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x1, 0x0) fchmod(r0, 0x20) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0x4) 23:26:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x9e132bf73994ec7e, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f00000001c0)={0x8000, 0x8}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz1'}, 0x4) [ 630.807770] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 630.815011] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 630.822254] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 630.829492] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 23:26:24 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x410100, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/224, 0xe0}, {&(0x7f0000000280)=""/80, 0x50}], 0x2, &(0x7f0000000340)=""/169, 0xa9}, 0x3) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0)={0x3, [0x6, 0x40, 0xd3b2]}, 0xa) [ 630.882296] BTRFS error (device loop2): open_ctree failed [ 630.890530] BTRFS error (device loop2): superblock checksum mismatch 23:26:24 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x8, 0x200000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={@mcast2, 0x0}, &(0x7f0000000180)=0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_vif\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) sendto(r0, &(0x7f0000000940)="532f765cd157373dff9ed2f85010bcc8ac4d66cda94231a79f9fc7f2d8bdc2927ef8928e661ec29b3b15768288060fe83cef8485fb2954274ffa4f4445a9d68a581b87a1deae24007fe209dbb8f79f20d0c37b10810c2d2308da6a4bb3c9fff9ba8dfc0f3975b163275bf675eb5b2b29ad71cc455aa394ae0037bd043f319899ca6f376f599fc4f3e302691ab411d5fc37d6276fe693f393c90ad0cec23e2a9862ca4b6246800da5aebbb2a18830a09d26f637839efcf5588b304565210b1d7d0fd447c3058d4a624d0568b0695e53d022ad2f9cb5fd0ef8b51e5d206af8d4b549a66b2dfaf397fe0bee75b9b37a4e6fe461e08df6a43bff55b6cdc126c7737252bc1055e67487931bfd8180513bdc457ec91b072381f2c5ecc6f53c4f5b5f7f9535b844106698bbe3a1c6b1423ee6a936bc16db8f6235a8898abb55bd2b3993886fb38b7fc73bba12893e4404b133d330aa0ddcf89e636d0a293573e2006ea9c7d0ae0a9e3e836b92c88836bd37434b3f5d16cea82738587e435aaa72afe5a058d04096f52eed52ea2deeec3a120285c9168f118540f87d77c2d96fe25c9ba673ee076b58133a2d3fe7fd9dbf769998e04f73a656e9f65fc5e1473166cf9015c042b154ff90f49560972e598dee4a87690921220c8e19ad075db22a258e93d739faaf4688e2642870fd7f59cdb8fd0a94895e9035ea89ad7d0abc92ec1eb069f48c842fbb60d35f1f8f6b3e1c77c382fa6330d565bc689d8bb9a582ecf593ace46dc7781442f81b98dc9d6d703c0139723fce359a797ead2065e71d08a9bef7d7b82a99589cfee1a23e62d88e9a8e591fffdaf5bf7d4336fb927b86bd28e88702a607df342fdc620bdc2185839fc91bf72e9e584cd0e6220a59ba60f47fcac144d2ec7cec6bc3746ef5c5e2b081972190dd553bc04a553c4c39723496119c5aa050b86dbfa940785f819e9167817d6b6aeefe887786364308aa33b067bf705326dc5eac1c084d1ebbbb57328d92f83d878d870cf8943ef5cd1d9c6e8b258715f7a1797bc2d081fcaf7078663bfa8acbad616996d97b762d3240cc4198f85160d4dfeba5114390376830ab45c28cbbd75f2c10232bb0b85e8f65f48d4a3af5d25742263563b01eb6a2f46a0fe03fc6b55a130a7d75233aae39f6fc086645f24ae0de6dc8293178899c951e9a975618a359b746203e949c549770ff89a0020de0152f55c16947115e347c12ccc1996d66501eae2a6126f5c929001971e1e31e5f50b072afbfe48bcac4d00bfd9eda28017e5bad7bdf22134cff2a4a830eea1420914368d502fb0567c68b7e76e5c9e5cd05ad2cb00c22174ba294f48092d52b453c18f89dc7faf1c90c90e1f0e8aa0bafb13dab07d45561cb611565c9e17232510dc7237d3ae5e62822bb0ad6808eaa502b86b2febcbb4df9bf88e05ac3d7a1fdb9b4ccc1aa14a8b5152fde8cb7319132af4885428f08a35519b062121452a27c19118110b3204618f6bebf817b94c25fdc796533c47c5d2513551e8f9d741700af0a5a925fda4baaacb94fcac1634f86d33f6ea2b3b2dff59458280ab848c00d30dee7018012f4bbe303af1c00638407434605ba7dd2e59c18d9ffffc2554652d41896c26c59428da5c66e89ade21d919e1fe60d293d92ac2fabee14a65dd2ffb9a8f40618dd03b68a6102d81e9c43341f6c382853463200f941113b9fce51e8740d8d60dfe8852227c31a781f5cf02273db70456dad1dfc23c7f0d56fb26c4f829eb9977397c9d0c027f7154a7994c32e6302e3c79021336195f0a0e81ce94ba0e3f471a8fc33ad7b5d1a47dc40430cecb83d4447e158b15f48e0454c2785b70f0ef5a24adc265e1070e2efa40d8f2909a01e79a4f1151335922c4ba702aaba0055f4270346790c958bbb5a8a283fc56119a1340ed5087deb78fae8c213c32465bfe480e643ea48263f9eea96741f1f39400113b138718421d890f957f635db4a6a7b686a9b88889182e8df3f880ba166df950be6a7087c83a1cfd5ce9f2dfe6f0be80f3ea1c72f414e45856bbf012cb7ffc8329bb4329b268aeaa2da2b7c5963742da26f64a5667d0c0ed3d50d34a1062237ee87d5b1ae234034fc5c3ebb41d3e68a2f2af978e1cd2fc58fb098b3eaaa2f1998b986e4c8fa0bab06005f992506973905dfccf8e8bfdf0bd56acdeaeff9cd940094bf47d54270ddad1d07857f25e555043f39aa64414038c8f057d737f5ba16c9f7aca88873763ac461d75f9df12d1d585e8b1938cf4069add95253d541b353b1e35140389575e67e312c26f8792eda4b49b78b1dadc904b1195445736ceb0173888a9804f88851b23d39f03931bb51b433f8506742e05a0c8d1a551254af9d40e5c7c19cddb01286535689bbabc172f4e63152b435d36c90381e25013ddeae9bc11e975b876958fece2bcc310b9e0049448f70159ed5a7eb065f33c0a0692faa755501bd407c0bd0291c6009b99ce5a448c962577592cae2de7acf5961b9f3b36dbca5a78cbb436bed82986d939e363276bc3d6f2afde3c9a24493b8913ebf8c4c11cdf12ad01baba3bbb55efc862e73e91ae26f995ce8fd090e2af95b952bc3b15d36ce2c3216a87b5ca659d5ae518960c07d68b06b8c853df69a8e01f410e5e980be7bcdbfe151cac39df4b93525fbad17febb96afbdc3bf743812b1b673222ca168eb668d0f51d99f0c5481618d4c50afe8a974da77f6c0cd62fad94f34f5a6490c86f96f2b010f37d4556749d7a1865ed35728990a9dae931bead44cf580caeeaf3d2d2fbc2fa3fc438ac0225e95deac66bd9b2654ef73ed4b06720cb1b281b61391ed2fceffe13c3a7d2a1bd19946fedd9240295c4a5934bdc6e84fa8cb4b5146e6f9456799810c783e6549c8325434ebe7f5d241ae2beeaf4f6d5cd1d1e6a85763f9149fbef41f9df72dbee12ff0f1774afe39a4f0b8d85dbc813475b5499bc905b0ce58443bc44ffedfe5c555bc2a3e03fdf1c2c6402f475189ef470b10448977745b718ce4d61ba0253afaefb2e1697e5ad9954b1fb4b297c14d36babbf5ed402b745cdaca44f45df807bbb25cd706aa2c9f56ffa8b0d6010f972b84f8f8375c1faf9fd9cd1f6a5427f7a89381bf81dbc7621c0554620d1609bbfabbf2c69768cd0f183cc9d48b9519af983f38560b5c0632e1d583e96faf75c196e71f77b05e45edd9912864277cc1c3c1e5abd21d5671473c5c1a364e8f2dc75bb661079aba4252afb0a1e3ef69885a438efd9d057bba65d5a0b7a70db51c14e58a50eb9073504ed10fdaf820baee6ea5166057bdf639a1ffa51d28df3e605d695784f2aeb8c60a0acd0c18e2175967d8be7fabf23f987ab037be0b1eb1b7d299331162d1cbbe405daf49d99ddaefbf21bdc84db3b375572513d0788faddfe5c646017fd3944e75843907d512af1df0c120d49d65869d137165e9f53d4ff323ca6d0f92a532dd4247d15b4f0aabaf61218c447661e8c7ab34dcd068ae6b4938dd9114403a4f9ba8b4e6c8f257c64c2fb7a8d2f0812d188ad2d7b102e73c4c8cd1c5e0a14171ea1583ba748f3ef111020de69608202539bde3995f8b5e01ccf6b9672eb75917c69d494b94ee8cb5d90568e215355ec3544df05e43bccdc4b57edb0e7cacda33ab7694799dfa32cdd87ba9c436b7a92b99a53d44fd25fe92c6a02126cc73e8ab2608a1e1e158a50a5a32f7af556184eee123546301cadfca660133230fc592ec84ff133243374984fb8004ed68fd49c79e00ef889ef8280a36c19008661fb1adc714161a336e6fbd6cc115b73778c9d1cdf3663d11649194e393a50abb9ea21555f658ad2a38f31d35b97887974e96a3239f088801a3a0939bf76c31d0cdedd543383719b3eb08d3a643288f727dbe952831f4d39b7b89181382e9729ebf31aca175659d1ca55fdf43073e2e9ce64b6d1141142b6b4b904d893d8706dece643fd4d897b1b9cadf86f874893a27b0932079e3a29daea1059670d3c05ba8ac9e2bd26c89b933cf51e7734ebd14648809e1658d4c17630daaa88f6e62c83ce616ee18723766a924a2c0568885ccf9eaca5af36265bb182fe7d3d1b6e958b7f01cc74191d3f646f1336825a99030c115414d515aa0cada51ed6698e00b54d9f8719a156f0fc980beb21779dbd7f05f2316eb4fc7ba344212accf1ad51899a9e53090dbd7c07256f37beafbbb5125b5aedd3b8f062d17b849eaabefceec8ae9681955e3804f51619e7e8f53bcb5347e8480622d694c08914299e8b96c89290e45110c0bad6afba9ae2ba709d4a3be0f0345cfc013db4e935af553030e744ec0421929b05813707a76f740aeaac9cb7c3fb62ceb08b56719673528bfd6059d7a62ff2ec82ec96b90056851c5277c924c29d9b6b6a5433bbc1a0c9e7345139db5a6faf4f7e948c1a6a1febbab9d55f8d05c0b4facfb0c96f108256eb610f0b483520190f83cadf9aaa4e5c1d93a98fe8d15b3701431ef16b214b5e9e601b80ddd9c48edc3e6d33ec50c1fc5e141a5420c82230b3f53b40cef7f5179b79a02a46447cf3cf3f0a99c8ce81c060111856dfb2ed412b4303bc23c36bee2ec2edf60eb489b613ba338714e02cde52cf3bc55883230b755d309ed4a8aa9b451e3c41b542f32487743837f76000006a9ce24c0a2d817de0071ea7c603b420e3baede5f5cb2199ac519c0058787772a0d7c950b9c56e53cc8b9e014141b0a92371bdb9a996a15fa6522226853213bdb6ce865781b39f8275fbd0165e71a1e7cd3af991b527dd67a2b1b425fe11cfa4fa5b273b08401130b350c15b40c36ee88f832a434c6359ce02844adc660d18f1ee2404b186416737b739bda5c9baf3a5695999540aa2c4186dd9eeb23e604fc2937a3151d95e67dae7a10fd364b6fb4af34440ae12822713c7e76ba5e31913fa8023d67fc8e2ea2c29f58abc1cc74bceebcea6a3c5e18f516a3872682b36f9ee48b7d5fa0762c95ecbbdb6d12c33b6865c63748954dfacc4627649c8aacfca1229029d4233f6a1a820f3277c59222d01bdcc268cda6d369f2b6c0e34170dc263eca8cd4940e3aeda9a0f230784e713266f9f9077f74b5abc9bd170b42b292aa5d4eec4f5a1e1acd4263b22ab3abed0af448f51174be2c4603d5cab9ab1312c12750776da81f974c978d066ad5bad66ffd5e1a0033f39e2ac464487c902a03779d32c2fe21747d6187e9ddabc62d96fa4ef4e8ddc67a63453ca93d066a610400007e112ce26a84e3f72c20daa73df2a26f6e4b41cac390db7498c2d1a4d84a2b604c893cda3e34711e378a0dac665600f6b9f2f1ea4f90be9aff4d525565b135952954e9f85212890a47939ed997695884e5448a3c3cbe1959d28f19331fe2014aa66b79541871050c9adc718c09fe7659bd93cd386b0ea70e72b8ce04adae29d12c612f63fb7be51d23f18220772ebe126daaedbfdda99b284cd9647f7b1c575f5ab54e8fb2a56d009cc60555cc5b47fc401307a48951624585e631a1b3abf3b4c36db5b44cd50b4674bf4619e65521fcd62fd6ca5b383212b14e0cf15d31017c7af4269d8ad8daf27d455d91ab3496aeb80d5c978c8977c7aa0b46ffe8697266365a61f8ff738ba5f9aba2ee847f80d4af172c7e6041ff0e136f80bbc338424822e1fbc6ccd79c1080ad76dedbc6d22492f0bd0310da149a62e4506d7df575e336040a5501c20b3135daa9ee05a008ca2fbf959424939966a833b684dd93929028fb612023ba6d946ad0c665a3d491358eb04da27689ad8383543aa21d49a778", 0x1000, 0x4000000, &(0x7f00000001c0)=@xdp={0x2c, 0x6, r1, 0x29}, 0x80) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:24 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 630.930188] BTRFS error (device loop2): open_ctree failed [ 630.938721] BTRFS error (device loop2): superblock checksum mismatch [ 630.970201] BTRFS error (device loop2): open_ctree failed [ 630.978727] BTRFS error (device loop2): superblock checksum mismatch 23:26:24 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$int_out(r0, 0x2, &(0x7f00000000c0)) 23:26:24 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x402200, 0x80) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000100), 0x4) 23:26:24 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 631.020644] BTRFS error (device loop2): open_ctree failed [ 631.043878] BTRFS error (device loop2): superblock checksum mismatch [ 631.100231] BTRFS error (device loop2): open_ctree failed [ 631.108242] BTRFS error (device loop2): superblock checksum mismatch [ 631.135122] FAULT_INJECTION: forcing a failure. [ 631.135122] name failslab, interval 1, probability 0, space 0, times 0 [ 631.149981] CPU: 0 PID: 16503 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 631.157080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.166409] Call Trace: [ 631.168971] dump_stack+0x138/0x19c [ 631.172571] should_fail.cold+0x10f/0x159 [ 631.176693] should_failslab+0xdb/0x130 [ 631.180639] kmem_cache_alloc_node+0x287/0x780 [ 631.185193] __alloc_skb+0x9c/0x500 [ 631.188788] ? skb_scrub_packet+0x4b0/0x4b0 [ 631.193079] ? netlink_has_listeners+0x20a/0x330 [ 631.197813] kobject_uevent_env+0x781/0xc23 [ 631.202108] ? internal_create_group+0x49a/0x7b0 [ 631.206836] kobject_uevent+0x20/0x26 [ 631.210611] lo_ioctl+0x11e7/0x1ce0 [ 631.214220] ? loop_probe+0x160/0x160 [ 631.217995] blkdev_ioctl+0x96b/0x1860 [ 631.221852] ? blkpg_ioctl+0x980/0x980 [ 631.225715] ? __might_sleep+0x93/0xb0 [ 631.229569] ? __fget+0x210/0x370 [ 631.232991] block_ioctl+0xde/0x120 [ 631.236586] ? blkdev_fallocate+0x3b0/0x3b0 [ 631.240876] do_vfs_ioctl+0x7ae/0x1060 [ 631.244733] ? selinux_file_mprotect+0x5d0/0x5d0 [ 631.249459] ? lock_downgrade+0x6e0/0x6e0 [ 631.253583] ? ioctl_preallocate+0x1c0/0x1c0 [ 631.257959] ? __fget+0x237/0x370 [ 631.261394] ? security_file_ioctl+0x89/0xb0 [ 631.265775] SyS_ioctl+0x8f/0xc0 [ 631.269126] ? do_vfs_ioctl+0x1060/0x1060 [ 631.273250] do_syscall_64+0x1e8/0x640 [ 631.277113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 631.281937] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 631.287102] RIP: 0033:0x459697 [ 631.290261] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 631.297939] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 631.305178] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 631.312418] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 631.319656] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 631.326893] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 [ 631.340167] BTRFS error (device loop2): open_ctree failed 23:26:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x4}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x8, 0x2, 0x9}, &(0x7f0000000200)=0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xffff}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r1, 0x0, 0x6, &(0x7f0000000040)='btrfs\x00', r2}, 0x30) 23:26:24 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:24 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) prlimit64(r0, 0xf, &(0x7f00000000c0)={0xcca}, &(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180)) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 23:26:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 631.347934] BTRFS error (device loop2): superblock checksum mismatch 23:26:24 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x1000, 0x2) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000340)='./file0\x00', 0x20000000000003, 0x204, &(0x7f0000000300)=[{&(0x7f0000000200)="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", 0x15c, 0x10003}], 0xf43, 0x0) 23:26:24 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x103000, 0x0) accept4$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev}, &(0x7f0000000380)=0xffffffffffffff4b, 0x800) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x80000) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$swradio(&(0x7f00000010c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_FIOGETOWN(r3, 0x8903, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) setsockopt$rose(r4, 0x104, 0x3, &(0x7f0000000140)=0x80, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x1, 0x100000001}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000400)=@assoc_value={r5, 0x8}, 0x8) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) write$capi20(r2, &(0x7f0000000300)={0x10, 0x3, 0x41, 0x81, 0xfffffffffffff1bc, 0x401}, 0x10) syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x4, 0x0) [ 631.411158] BTRFS error (device loop2): open_ctree failed [ 631.421107] BTRFS error (device loop2): superblock checksum mismatch 23:26:24 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 631.461630] BTRFS error (device loop2): open_ctree failed [ 631.472483] BTRFS error (device loop2): superblock checksum mismatch 23:26:24 executing program 0 (fault-call:6 fault-nth:0): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:24 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0xa8b, @mcast1, 0xeb5}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:24 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 631.531862] BTRFS error (device loop2): open_ctree failed [ 631.557001] BTRFS error (device loop2): superblock checksum mismatch [ 631.557945] FAULT_INJECTION: forcing a failure. [ 631.557945] name failslab, interval 1, probability 0, space 0, times 0 [ 631.588930] CPU: 1 PID: 16540 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 631.596058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.605396] Call Trace: [ 631.607977] dump_stack+0x138/0x19c [ 631.611599] should_fail.cold+0x10f/0x159 [ 631.615731] should_failslab+0xdb/0x130 [ 631.619688] __kmalloc+0x2f0/0x7a0 [ 631.619697] ? __sb_end_write+0xc1/0x100 [ 631.619706] ? strnlen_user+0x12f/0x1a0 [ 631.619716] ? SyS_memfd_create+0xba/0x3a0 [ 631.626445] FAULT_INJECTION: forcing a failure. [ 631.626445] name failslab, interval 1, probability 0, space 0, times 0 [ 631.627263] SyS_memfd_create+0xba/0x3a0 [ 631.650597] ? shmem_fcntl+0x130/0x130 [ 631.654464] ? do_syscall_64+0x53/0x640 [ 631.658418] ? shmem_fcntl+0x130/0x130 [ 631.662291] do_syscall_64+0x1e8/0x640 [ 631.666161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 631.670992] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 631.676159] RIP: 0033:0x459829 [ 631.679328] RSP: 002b:00007fbbdbe66a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 23:26:25 executing program 0 (fault-call:6 fault-nth:1): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 631.687020] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 631.694268] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 631.701516] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 631.708768] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fbbdbe676d4 [ 631.716016] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 631.723643] CPU: 0 PID: 16545 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 631.730730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.740068] Call Trace: [ 631.742642] dump_stack+0x138/0x19c [ 631.743435] FAULT_INJECTION: forcing a failure. [ 631.743435] name failslab, interval 1, probability 0, space 0, times 0 [ 631.746263] should_fail.cold+0x10f/0x159 [ 631.746277] should_failslab+0xdb/0x130 [ 631.746287] __kmalloc+0x2f0/0x7a0 [ 631.746296] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 631.746309] ? kobject_uevent_env+0x378/0xc23 [ 631.778923] ? rcu_read_lock_sched_held+0x110/0x130 [ 631.783919] ? kobject_get_path+0xbb/0x1a0 [ 631.788138] kobject_get_path+0xbb/0x1a0 [ 631.792178] ? devm_device_remove_groups+0x50/0x50 [ 631.797085] kobject_uevent_env+0x39c/0xc23 [ 631.801384] ? internal_create_group+0x49a/0x7b0 [ 631.806123] kobject_uevent+0x20/0x26 [ 631.809902] lo_ioctl+0x11e7/0x1ce0 [ 631.813508] ? loop_probe+0x160/0x160 [ 631.817288] blkdev_ioctl+0x96b/0x1860 [ 631.821154] ? blkpg_ioctl+0x980/0x980 [ 631.825027] ? __might_sleep+0x93/0xb0 [ 631.828891] ? __fget+0x210/0x370 [ 631.832325] block_ioctl+0xde/0x120 [ 631.835929] ? blkdev_fallocate+0x3b0/0x3b0 [ 631.840229] do_vfs_ioctl+0x7ae/0x1060 [ 631.844095] ? selinux_file_mprotect+0x5d0/0x5d0 [ 631.849335] ? lock_downgrade+0x6e0/0x6e0 [ 631.853465] ? ioctl_preallocate+0x1c0/0x1c0 [ 631.857853] ? __fget+0x237/0x370 [ 631.861292] ? security_file_ioctl+0x89/0xb0 [ 631.865683] SyS_ioctl+0x8f/0xc0 [ 631.869026] ? do_vfs_ioctl+0x1060/0x1060 [ 631.873157] do_syscall_64+0x1e8/0x640 [ 631.877024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 631.881849] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 631.887013] RIP: 0033:0x459697 [ 631.890181] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 631.897874] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 631.905121] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 631.912370] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 631.919620] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 631.926869] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 [ 631.934840] CPU: 1 PID: 16549 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 631.941931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.951261] Call Trace: [ 631.953822] dump_stack+0x138/0x19c [ 631.957425] should_fail.cold+0x10f/0x159 [ 631.961550] should_failslab+0xdb/0x130 [ 631.965496] kmem_cache_alloc+0x2d7/0x780 [ 631.969613] ? __alloc_fd+0x1d4/0x4a0 [ 631.973386] __d_alloc+0x2d/0x9f0 [ 631.976812] ? lock_downgrade+0x6e0/0x6e0 [ 631.980931] d_alloc_pseudo+0x1e/0x30 [ 631.984702] __shmem_file_setup.part.0+0xd8/0x400 [ 631.989512] ? __alloc_fd+0x1d4/0x4a0 [ 631.993284] ? shmem_fill_super+0x8c0/0x8c0 [ 631.997583] SyS_memfd_create+0x1f9/0x3a0 [ 632.001703] ? shmem_fcntl+0x130/0x130 [ 632.005558] ? do_syscall_64+0x53/0x640 [ 632.009501] ? shmem_fcntl+0x130/0x130 [ 632.013362] do_syscall_64+0x1e8/0x640 [ 632.017722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 632.022542] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 632.027704] RIP: 0033:0x459829 [ 632.030863] RSP: 002b:00007fbbdbe66a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 632.038540] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 632.045783] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 632.053022] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 632.060265] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fbbdbe676d4 [ 632.067504] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 632.074904] net_ratelimit: 22 callbacks suppressed [ 632.074907] protocol 88fb is buggy, dev hsr_slave_0 [ 632.077765] BTRFS error (device loop2): open_ctree failed 23:26:25 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x121000, 0x101) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, r1, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000140)) [ 632.079860] protocol 88fb is buggy, dev hsr_slave_1 [ 632.095464] protocol 88fb is buggy, dev hsr_slave_0 [ 632.100512] protocol 88fb is buggy, dev hsr_slave_1 [ 632.123803] BTRFS error (device loop2): superblock checksum mismatch [ 632.170294] BTRFS error (device loop2): open_ctree failed [ 632.178700] BTRFS error (device loop2): superblock checksum mismatch [ 632.210678] BTRFS error (device loop2): open_ctree failed [ 632.222297] BTRFS error (device loop2): superblock checksum mismatch [ 632.255875] BTRFS error (device loop2): open_ctree failed [ 632.262855] BTRFS error (device loop2): superblock checksum mismatch 23:26:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x40, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x602) linkat(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x1000) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/relabel\x00', 0x2, 0x0) 23:26:25 executing program 0 (fault-call:6 fault-nth:2): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:25 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) madvise(&(0x7f0000a62000/0x2000)=nil, 0x2000, 0x1) socket$can_bcm(0x1d, 0x2, 0x2) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:25 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 632.340226] BTRFS error (device loop2): open_ctree failed [ 632.367828] FAULT_INJECTION: forcing a failure. [ 632.367828] name failslab, interval 1, probability 0, space 0, times 0 [ 632.379101] CPU: 1 PID: 16575 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 632.386242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.395570] Call Trace: [ 632.398137] dump_stack+0x138/0x19c [ 632.401740] should_fail.cold+0x10f/0x159 [ 632.405863] should_failslab+0xdb/0x130 [ 632.409810] kmem_cache_alloc+0x2d7/0x780 [ 632.413936] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 632.419374] ? rcu_read_lock_sched_held+0x110/0x130 [ 632.424377] ? shmem_destroy_callback+0xa0/0xa0 [ 632.429023] shmem_alloc_inode+0x1c/0x50 [ 632.433064] alloc_inode+0x64/0x180 [ 632.436670] new_inode_pseudo+0x19/0xf0 [ 632.440614] new_inode+0x1f/0x40 [ 632.443949] shmem_get_inode+0x75/0x750 [ 632.447892] __shmem_file_setup.part.0+0x111/0x400 [ 632.452797] ? __alloc_fd+0x1d4/0x4a0 [ 632.456576] ? shmem_fill_super+0x8c0/0x8c0 [ 632.460869] SyS_memfd_create+0x1f9/0x3a0 [ 632.464986] ? shmem_fcntl+0x130/0x130 [ 632.468841] ? do_syscall_64+0x53/0x640 [ 632.472796] ? shmem_fcntl+0x130/0x130 [ 632.476663] do_syscall_64+0x1e8/0x640 [ 632.480521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 632.485335] entry_SYSCALL_64_after_hwframe+0x42/0xb7 23:26:25 executing program 0 (fault-call:6 fault-nth:3): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 632.490511] RIP: 0033:0x459829 [ 632.493687] RSP: 002b:00007fbbdbe66a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 632.501378] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 632.508622] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 632.515865] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 632.523105] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fbbdbe676d4 [ 632.530350] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 632.564430] FAULT_INJECTION: forcing a failure. [ 632.564430] name failslab, interval 1, probability 0, space 0, times 0 [ 632.577428] CPU: 1 PID: 16583 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 632.584528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.593866] Call Trace: [ 632.596430] dump_stack+0x138/0x19c [ 632.600041] should_fail.cold+0x10f/0x159 [ 632.604170] should_failslab+0xdb/0x130 [ 632.608121] kmem_cache_alloc_node_trace+0x280/0x770 [ 632.613198] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 632.618623] __kmalloc_node_track_caller+0x3d/0x80 [ 632.623529] __kmalloc_reserve.isra.0+0x40/0xe0 [ 632.628170] __alloc_skb+0xcf/0x500 [ 632.631767] ? skb_scrub_packet+0x4b0/0x4b0 [ 632.636168] ? netlink_has_listeners+0x20a/0x330 [ 632.640106] protocol 88fb is buggy, dev hsr_slave_0 [ 632.640898] kobject_uevent_env+0x781/0xc23 [ 632.645925] protocol 88fb is buggy, dev hsr_slave_1 [ 632.650180] ? internal_create_group+0x49a/0x7b0 [ 632.650194] kobject_uevent+0x20/0x26 [ 632.650202] lo_ioctl+0x11e7/0x1ce0 [ 632.650213] ? loop_probe+0x160/0x160 [ 632.671041] blkdev_ioctl+0x96b/0x1860 [ 632.674902] ? blkpg_ioctl+0x980/0x980 [ 632.678763] ? __might_sleep+0x93/0xb0 [ 632.682618] ? __fget+0x210/0x370 [ 632.686042] block_ioctl+0xde/0x120 [ 632.689640] ? blkdev_fallocate+0x3b0/0x3b0 [ 632.693941] do_vfs_ioctl+0x7ae/0x1060 [ 632.697801] ? selinux_file_mprotect+0x5d0/0x5d0 [ 632.702526] ? lock_downgrade+0x6e0/0x6e0 [ 632.706644] ? ioctl_preallocate+0x1c0/0x1c0 [ 632.711022] ? __fget+0x237/0x370 [ 632.714448] ? security_file_ioctl+0x89/0xb0 [ 632.718827] SyS_ioctl+0x8f/0xc0 [ 632.722163] ? do_vfs_ioctl+0x1060/0x1060 [ 632.726286] do_syscall_64+0x1e8/0x640 [ 632.730145] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 632.734963] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 632.740122] RIP: 0033:0x459697 [ 632.743282] RSP: 002b:00007f4184b56a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 632.750963] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 632.758201] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 632.765440] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 632.772681] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 632.779920] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000003 [ 632.787287] protocol 88fb is buggy, dev hsr_slave_0 [ 632.792348] protocol 88fb is buggy, dev hsr_slave_1 [ 632.797431] protocol 88fb is buggy, dev hsr_slave_0 [ 632.802495] protocol 88fb is buggy, dev hsr_slave_1 [ 632.812845] FAULT_INJECTION: forcing a failure. [ 632.812845] name failslab, interval 1, probability 0, space 0, times 0 [ 632.824138] CPU: 1 PID: 16590 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 632.831226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.840567] Call Trace: [ 632.843143] dump_stack+0x138/0x19c [ 632.846766] should_fail.cold+0x10f/0x159 [ 632.850912] should_failslab+0xdb/0x130 [ 632.854874] kmem_cache_alloc+0x2d7/0x780 [ 632.859018] ? shmem_alloc_inode+0x1c/0x50 [ 632.863240] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 632.868680] selinux_inode_alloc_security+0xb6/0x2a0 [ 632.873768] security_inode_alloc+0x94/0xd0 [ 632.878069] inode_init_always+0x552/0xaf0 [ 632.882278] alloc_inode+0x81/0x180 [ 632.885877] new_inode_pseudo+0x19/0xf0 [ 632.889824] new_inode+0x1f/0x40 [ 632.893164] shmem_get_inode+0x75/0x750 [ 632.897112] __shmem_file_setup.part.0+0x111/0x400 [ 632.902013] ? __alloc_fd+0x1d4/0x4a0 [ 632.905784] ? shmem_fill_super+0x8c0/0x8c0 [ 632.910082] SyS_memfd_create+0x1f9/0x3a0 [ 632.914202] ? shmem_fcntl+0x130/0x130 [ 632.918059] ? do_syscall_64+0x53/0x640 [ 632.922005] ? shmem_fcntl+0x130/0x130 [ 632.925865] do_syscall_64+0x1e8/0x640 [ 632.929724] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 632.934542] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 632.939703] RIP: 0033:0x459829 [ 632.942865] RSP: 002b:00007fbbdbe66a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 632.950543] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 632.957786] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 23:26:26 executing program 0 (fault-call:6 fault-nth:4): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 632.965029] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 632.972271] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fbbdbe676d4 [ 632.979511] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 632.992507] BTRFS error (device loop2): superblock checksum mismatch [ 633.023028] FAULT_INJECTION: forcing a failure. [ 633.023028] name failslab, interval 1, probability 0, space 0, times 0 [ 633.034565] CPU: 1 PID: 16598 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 633.041659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.051321] Call Trace: [ 633.051332] dump_stack+0x138/0x19c [ 633.051349] should_fail.cold+0x10f/0x159 [ 633.061628] should_failslab+0xdb/0x130 [ 633.065585] kmem_cache_alloc+0x2d7/0x780 [ 633.069705] ? lock_downgrade+0x6e0/0x6e0 [ 633.073824] get_empty_filp+0x8c/0x3f0 [ 633.077684] alloc_file+0x23/0x440 [ 633.081207] __shmem_file_setup.part.0+0x1b1/0x400 [ 633.086114] ? __alloc_fd+0x1d4/0x4a0 [ 633.089885] ? shmem_fill_super+0x8c0/0x8c0 [ 633.094180] SyS_memfd_create+0x1f9/0x3a0 [ 633.098296] ? shmem_fcntl+0x130/0x130 [ 633.102157] ? do_syscall_64+0x53/0x640 [ 633.106107] ? shmem_fcntl+0x130/0x130 [ 633.109964] do_syscall_64+0x1e8/0x640 [ 633.113821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 633.118645] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 633.123807] RIP: 0033:0x459829 [ 633.126966] RSP: 002b:00007fbbdbe66a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 633.134641] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 633.141889] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 633.149134] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 633.156373] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fbbdbe676d4 [ 633.163616] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:26 executing program 0 (fault-call:6 fault-nth:5): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 633.175401] BTRFS error (device loop2): open_ctree failed [ 633.186382] BTRFS error (device loop2): superblock checksum mismatch [ 633.204401] FAULT_INJECTION: forcing a failure. [ 633.204401] name failslab, interval 1, probability 0, space 0, times 0 [ 633.215715] CPU: 1 PID: 16605 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 633.222804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.232144] Call Trace: [ 633.234710] dump_stack+0x138/0x19c [ 633.238312] should_fail.cold+0x10f/0x159 [ 633.242444] should_failslab+0xdb/0x130 [ 633.246396] kmem_cache_alloc+0x2d7/0x780 [ 633.250517] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 633.255937] ? check_preemption_disabled+0x3c/0x250 [ 633.260940] selinux_file_alloc_security+0xb4/0x190 [ 633.265938] security_file_alloc+0x6d/0xa0 [ 633.270145] get_empty_filp+0x162/0x3f0 [ 633.274090] alloc_file+0x23/0x440 [ 633.277602] __shmem_file_setup.part.0+0x1b1/0x400 [ 633.282507] ? __alloc_fd+0x1d4/0x4a0 [ 633.286284] ? shmem_fill_super+0x8c0/0x8c0 [ 633.290582] SyS_memfd_create+0x1f9/0x3a0 [ 633.294702] ? shmem_fcntl+0x130/0x130 [ 633.298558] ? do_syscall_64+0x53/0x640 [ 633.302512] ? shmem_fcntl+0x130/0x130 [ 633.306380] do_syscall_64+0x1e8/0x640 [ 633.310237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 633.315052] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 633.320218] RIP: 0033:0x459829 [ 633.323388] RSP: 002b:00007fbbdbe66a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 633.331076] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 633.338319] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 633.345570] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 633.352809] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fbbdbe676d4 [ 633.360052] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 633.370858] BTRFS error (device loop2): open_ctree failed 23:26:26 executing program 0 (fault-call:6 fault-nth:6): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:26 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:26 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000100)={0x965a, 0x3, 0x9, 0x20}, 0x6) [ 633.377888] BTRFS error (device loop2): superblock checksum mismatch [ 633.395481] FAULT_INJECTION: forcing a failure. [ 633.395481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 633.410692] CPU: 0 PID: 16611 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 633.417873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.427198] Call Trace: [ 633.429759] dump_stack+0x138/0x19c [ 633.433362] should_fail.cold+0x10f/0x159 [ 633.437479] ? __might_sleep+0x93/0xb0 [ 633.441338] __alloc_pages_nodemask+0x1d6/0x7a0 [ 633.445978] ? __alloc_pages_slowpath+0x2930/0x2930 [ 633.450964] ? lock_downgrade+0x6e0/0x6e0 [ 633.455088] alloc_pages_vma+0xc9/0x4c0 [ 633.459031] shmem_alloc_page+0xf6/0x1a0 [ 633.463062] ? shmem_swapin+0x1a0/0x1a0 [ 633.467008] ? cred_has_capability+0x142/0x290 [ 633.471563] ? check_preemption_disabled+0x3c/0x250 [ 633.476549] ? __this_cpu_preempt_check+0x1d/0x30 [ 633.481360] ? percpu_counter_add_batch+0x112/0x160 [ 633.486347] ? __vm_enough_memory+0x26a/0x490 [ 633.490821] shmem_alloc_and_acct_page+0x12a/0x680 [ 633.495727] shmem_getpage_gfp+0x3e7/0x25d0 [ 633.500031] ? shmem_add_to_page_cache+0x860/0x860 [ 633.504933] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 633.510092] shmem_write_begin+0xfd/0x1b0 [ 633.514211] ? trace_hardirqs_on_caller+0x400/0x590 [ 633.519196] generic_perform_write+0x1f8/0x480 [ 633.523750] ? page_endio+0x530/0x530 [ 633.527518] ? current_time+0xb0/0xb0 [ 633.531290] ? generic_file_write_iter+0x9a/0x660 [ 633.536104] __generic_file_write_iter+0x239/0x5b0 [ 633.541006] generic_file_write_iter+0x303/0x660 [ 633.545732] __vfs_write+0x4a7/0x6b0 [ 633.549414] ? selinux_file_open+0x420/0x420 [ 633.553790] ? kernel_read+0x120/0x120 [ 633.557645] ? check_preemption_disabled+0x3c/0x250 [ 633.562632] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 633.568052] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 633.572774] ? __sb_start_write+0x153/0x2f0 [ 633.577064] vfs_write+0x198/0x500 [ 633.580575] SyS_pwrite64+0x115/0x140 [ 633.584346] ? SyS_pread64+0x140/0x140 [ 633.588201] ? do_syscall_64+0x53/0x640 [ 633.592143] ? SyS_pread64+0x140/0x140 [ 633.596003] do_syscall_64+0x1e8/0x640 [ 633.599879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 633.604696] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 633.609856] RIP: 0033:0x413777 [ 633.613039] RSP: 002b:00007fbbdbe66a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 633.620716] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 633.627957] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 [ 633.635199] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 633.642439] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 633.649677] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 633.657281] BTRFS error (device loop2): open_ctree failed [ 633.673059] BTRFS error (device loop2): superblock checksum mismatch [ 633.720213] BTRFS error (device loop2): open_ctree failed [ 633.727145] BTRFS error (device loop2): superblock checksum mismatch [ 633.800287] BTRFS error (device loop2): open_ctree failed 23:26:27 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:27 executing program 0 (fault-call:6 fault-nth:7): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_BMAP(r0, &(0x7f00000000c0)={0x18, 0x0, 0x3, {0x3}}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @raw_data=[0x4, 0xe4, 0x2, 0x0, 0x0, 0x9a, 0x100000000, 0x4, 0x3, 0x2, 0x20, 0x8, 0x3, 0x3, 0x5, 0x621, 0x5, 0x8, 0xfff, 0x0, 0x43f645fa, 0xfd, 0x4, 0x5, 0x8, 0x2, 0x3f, 0x3, 0x1f, 0x3c57, 0x7ff, 0x570a]}) fcntl$setlease(r0, 0x400, 0x0) 23:26:27 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 633.860352] BTRFS error (device loop2): superblock checksum mismatch [ 633.886247] FAULT_INJECTION: forcing a failure. [ 633.886247] name failslab, interval 1, probability 0, space 0, times 0 [ 633.897437] CPU: 0 PID: 16632 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 633.904505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.913842] Call Trace: [ 633.916410] dump_stack+0x138/0x19c [ 633.920014] should_fail.cold+0x10f/0x159 [ 633.924140] should_failslab+0xdb/0x130 [ 633.928087] kmem_cache_alloc+0x47/0x780 [ 633.932124] ? __alloc_pages_slowpath+0x2930/0x2930 [ 633.937122] ? lock_downgrade+0x6e0/0x6e0 [ 633.941247] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 633.946845] __radix_tree_create+0x337/0x4d0 [ 633.951224] __radix_tree_insert+0xab/0x570 [ 633.955515] ? __radix_tree_create+0x4d0/0x4d0 [ 633.960070] shmem_add_to_page_cache+0x5a4/0x860 [ 633.964798] ? shmem_writepage+0xbb0/0xbb0 [ 633.969003] ? __radix_tree_preload+0x1d2/0x260 [ 633.973645] shmem_getpage_gfp+0x1757/0x25d0 [ 633.978026] ? shmem_add_to_page_cache+0x860/0x860 [ 633.982927] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 633.988088] shmem_write_begin+0xfd/0x1b0 [ 633.992204] ? trace_hardirqs_on_caller+0x400/0x590 [ 633.997193] generic_perform_write+0x1f8/0x480 [ 634.001753] ? page_endio+0x530/0x530 [ 634.005529] ? current_time+0xb0/0xb0 [ 634.009299] ? generic_file_write_iter+0x9a/0x660 [ 634.014115] __generic_file_write_iter+0x239/0x5b0 [ 634.019014] generic_file_write_iter+0x303/0x660 [ 634.023949] __vfs_write+0x4a7/0x6b0 [ 634.027632] ? selinux_file_open+0x420/0x420 [ 634.032009] ? kernel_read+0x120/0x120 [ 634.035869] ? check_preemption_disabled+0x3c/0x250 [ 634.040857] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 634.046279] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 634.051004] ? __sb_start_write+0x153/0x2f0 [ 634.055294] vfs_write+0x198/0x500 [ 634.058808] SyS_pwrite64+0x115/0x140 [ 634.062577] ? SyS_pread64+0x140/0x140 [ 634.066433] ? do_syscall_64+0x53/0x640 [ 634.070375] ? SyS_pread64+0x140/0x140 [ 634.074234] do_syscall_64+0x1e8/0x640 [ 634.078092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.082908] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.088065] RIP: 0033:0x413777 [ 634.091226] RSP: 002b:00007fbbdbe66a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 634.098902] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 634.106143] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 [ 634.113387] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 634.120632] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 634.127872] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:27 executing program 0 (fault-call:6 fault-nth:8): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 634.169314] FAULT_INJECTION: forcing a failure. [ 634.169314] name failslab, interval 1, probability 0, space 0, times 0 [ 634.182010] FAULT_INJECTION: forcing a failure. [ 634.182010] name failslab, interval 1, probability 0, space 0, times 0 [ 634.183787] CPU: 0 PID: 16637 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 634.200266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.209598] Call Trace: [ 634.212166] dump_stack+0x138/0x19c [ 634.215781] should_fail.cold+0x10f/0x159 [ 634.219913] should_failslab+0xdb/0x130 [ 634.223870] __kmalloc+0x2f0/0x7a0 [ 634.227392] ? __sb_end_write+0xc1/0x100 [ 634.231434] ? strnlen_user+0x12f/0x1a0 [ 634.235385] ? SyS_memfd_create+0xba/0x3a0 [ 634.239597] SyS_memfd_create+0xba/0x3a0 [ 634.243640] ? shmem_fcntl+0x130/0x130 [ 634.247506] ? do_syscall_64+0x53/0x640 [ 634.251460] ? shmem_fcntl+0x130/0x130 [ 634.255329] do_syscall_64+0x1e8/0x640 [ 634.259200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.264030] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.269199] RIP: 0033:0x459829 [ 634.272367] RSP: 002b:00007f9c10af8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 634.280142] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 634.287389] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 634.294637] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 634.301890] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9c10af96d4 [ 634.309139] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 634.317032] CPU: 1 PID: 16642 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 634.324119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.333448] Call Trace: [ 634.336007] dump_stack+0x138/0x19c [ 634.339607] should_fail.cold+0x10f/0x159 [ 634.343732] should_failslab+0xdb/0x130 [ 634.347681] kmem_cache_alloc+0x2d7/0x780 [ 634.351800] ? vfs_write+0x25f/0x500 [ 634.355486] getname_flags+0xcb/0x580 [ 634.359260] ? check_preemption_disabled+0x3c/0x250 [ 634.364252] getname+0x1a/0x20 [ 634.367414] do_sys_open+0x1e7/0x430 [ 634.371100] ? filp_open+0x70/0x70 [ 634.374611] ? fput+0xd4/0x150 [ 634.377777] ? SyS_pwrite64+0xca/0x140 [ 634.381639] SyS_open+0x2d/0x40 [ 634.384887] ? do_sys_open+0x430/0x430 [ 634.388746] do_syscall_64+0x1e8/0x640 [ 634.392605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.397429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.402588] RIP: 0033:0x413711 [ 634.405750] RSP: 002b:00007fbbdbe66a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 634.413427] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 634.420667] RDX: 00007fbbdbe66b0a RSI: 0000000000000002 RDI: 00007fbbdbe66b00 [ 634.427908] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 634.435150] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 634.442391] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:27 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:27 executing program 0 (fault-call:6 fault-nth:9): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 634.480180] BTRFS error (device loop2): open_ctree failed [ 634.495029] FAULT_INJECTION: forcing a failure. [ 634.495029] name failslab, interval 1, probability 0, space 0, times 0 [ 634.506677] CPU: 0 PID: 16651 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 634.513763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.513767] Call Trace: [ 634.513780] dump_stack+0x138/0x19c [ 634.513795] should_fail.cold+0x10f/0x159 [ 634.513807] should_failslab+0xdb/0x130 [ 634.513817] kmem_cache_alloc+0x2d7/0x780 [ 634.513825] ? save_stack+0xa9/0xd0 [ 634.513839] get_empty_filp+0x8c/0x3f0 [ 634.525726] path_openat+0x8f/0x3f70 [ 634.525740] ? generic_perform_write+0x34f/0x480 [ 634.525758] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 634.525769] ? save_trace+0x290/0x290 [ 634.533485] ? __alloc_fd+0x1d4/0x4a0 [ 634.533495] do_filp_open+0x18e/0x250 [ 634.533504] ? may_open_dev+0xe0/0xe0 [ 634.533515] ? lock_downgrade+0x6e0/0x6e0 [ 634.533528] ? _raw_spin_unlock+0x2d/0x50 [ 634.533536] ? __alloc_fd+0x1d4/0x4a0 [ 634.533552] do_sys_open+0x2c5/0x430 [ 634.541611] ? filp_open+0x70/0x70 [ 634.541618] ? fput+0xd4/0x150 [ 634.541627] ? SyS_pwrite64+0xca/0x140 [ 634.541639] SyS_open+0x2d/0x40 [ 634.541646] ? do_sys_open+0x430/0x430 [ 634.541654] do_syscall_64+0x1e8/0x640 [ 634.541660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.541671] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.624329] RIP: 0033:0x413711 23:26:28 executing program 2 (fault-call:3 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 634.627492] RSP: 002b:00007fbbdbe66a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 634.635174] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 634.642421] RDX: 00007fbbdbe66b0a RSI: 0000000000000002 RDI: 00007fbbdbe66b00 [ 634.649662] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 634.656903] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 634.664141] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 634.699874] FAULT_INJECTION: forcing a failure. [ 634.699874] name failslab, interval 1, probability 0, space 0, times 0 [ 634.700484] BTRFS error (device loop5): superblock checksum mismatch [ 634.719119] CPU: 0 PID: 16656 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 634.726211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.726221] Call Trace: [ 634.738118] dump_stack+0x138/0x19c [ 634.741737] should_fail.cold+0x10f/0x159 [ 634.741750] should_failslab+0xdb/0x130 23:26:28 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 634.741760] kmem_cache_alloc+0x2d7/0x780 [ 634.741769] ? __alloc_fd+0x1d4/0x4a0 [ 634.741780] __d_alloc+0x2d/0x9f0 [ 634.741792] ? lock_downgrade+0x6e0/0x6e0 [ 634.765331] d_alloc_pseudo+0x1e/0x30 [ 634.769120] __shmem_file_setup.part.0+0xd8/0x400 [ 634.773945] ? __alloc_fd+0x1d4/0x4a0 [ 634.777738] ? shmem_fill_super+0x8c0/0x8c0 [ 634.782052] SyS_memfd_create+0x1f9/0x3a0 [ 634.782061] ? shmem_fcntl+0x130/0x130 [ 634.782069] ? do_syscall_64+0x53/0x640 [ 634.782077] ? shmem_fcntl+0x130/0x130 [ 634.782086] do_syscall_64+0x1e8/0x640 [ 634.790069] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.790084] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.790090] RIP: 0033:0x459829 [ 634.790094] RSP: 002b:00007f9c10af8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 634.790102] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 634.790109] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 634.837081] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 23:26:28 executing program 0 (fault-call:6 fault-nth:10): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:28 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 634.844322] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9c10af96d4 [ 634.851563] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 634.895678] FAULT_INJECTION: forcing a failure. [ 634.895678] name failslab, interval 1, probability 0, space 0, times 0 [ 634.901198] FAULT_INJECTION: forcing a failure. [ 634.901198] name failslab, interval 1, probability 0, space 0, times 0 [ 634.909728] CPU: 1 PID: 16670 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 634.925147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.934559] Call Trace: [ 634.937127] dump_stack+0x138/0x19c [ 634.940738] should_fail.cold+0x10f/0x159 [ 634.944870] should_failslab+0xdb/0x130 [ 634.948823] __kmalloc+0x2f0/0x7a0 [ 634.952342] ? __sb_end_write+0xc1/0x100 [ 634.956383] ? strnlen_user+0x12f/0x1a0 [ 634.960339] ? SyS_memfd_create+0xba/0x3a0 [ 634.964551] SyS_memfd_create+0xba/0x3a0 [ 634.968595] ? shmem_fcntl+0x130/0x130 [ 634.972465] ? do_syscall_64+0x53/0x640 [ 634.976419] ? shmem_fcntl+0x130/0x130 [ 634.980286] do_syscall_64+0x1e8/0x640 [ 634.984153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.989138] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.994303] RIP: 0033:0x459829 [ 634.997469] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 635.005157] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 635.012405] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 635.019658] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 635.026909] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3f2243e6d4 [ 635.034155] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 635.041416] CPU: 0 PID: 16671 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 635.047179] BTRFS error (device loop5): open_ctree failed [ 635.048497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.048501] Call Trace: [ 635.048510] dump_stack+0x138/0x19c [ 635.048521] should_fail.cold+0x10f/0x159 [ 635.063359] should_failslab+0xdb/0x130 [ 635.063370] kmem_cache_alloc+0x2d7/0x780 [ 635.063378] ? save_stack+0xa9/0xd0 [ 635.063390] get_empty_filp+0x8c/0x3f0 [ 635.063400] path_openat+0x8f/0x3f70 [ 635.069560] ? trace_hardirqs_on+0x10/0x10 [ 635.069571] ? check_preemption_disabled+0x3c/0x250 [ 635.069584] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 635.077643] ? find_held_lock+0x35/0x130 [ 635.077652] ? save_trace+0x290/0x290 [ 635.077661] ? __alloc_fd+0x1d4/0x4a0 [ 635.077670] do_filp_open+0x18e/0x250 [ 635.122054] ? may_open_dev+0xe0/0xe0 [ 635.125827] ? lock_downgrade+0x6e0/0x6e0 [ 635.129949] ? _raw_spin_unlock+0x2d/0x50 [ 635.134068] ? __alloc_fd+0x1d4/0x4a0 [ 635.137845] do_sys_open+0x2c5/0x430 [ 635.141530] ? filp_open+0x70/0x70 [ 635.145040] ? fput+0xd4/0x150 [ 635.148204] ? SyS_pwrite64+0xca/0x140 [ 635.152070] SyS_open+0x2d/0x40 [ 635.155321] ? do_sys_open+0x430/0x430 [ 635.159181] do_syscall_64+0x1e8/0x640 [ 635.163038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 635.167855] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.173025] RIP: 0033:0x413711 [ 635.176188] RSP: 002b:00007fbbdbe66a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 635.183867] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 23:26:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) ioctl(r0, 0x80000100, &(0x7f0000000100)="11dca5055e0b00007bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 635.191110] RDX: 00007fbbdbe66b0a RSI: 0000000000000002 RDI: 00007fbbdbe66b00 [ 635.198351] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 635.205589] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 635.212830] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 635.252779] BTRFS error (device loop5): superblock checksum mismatch [ 635.271768] FAULT_INJECTION: forcing a failure. [ 635.271768] name failslab, interval 1, probability 0, space 0, times 0 [ 635.293934] CPU: 0 PID: 16678 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 635.301024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.310360] Call Trace: [ 635.312937] dump_stack+0x138/0x19c [ 635.316550] should_fail.cold+0x10f/0x159 [ 635.320678] should_failslab+0xdb/0x130 [ 635.324623] kmem_cache_alloc+0x2d7/0x780 [ 635.328742] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 635.334163] ? rcu_read_lock_sched_held+0x110/0x130 [ 635.339156] ? shmem_destroy_callback+0xa0/0xa0 [ 635.343798] shmem_alloc_inode+0x1c/0x50 [ 635.347826] alloc_inode+0x64/0x180 [ 635.351426] new_inode_pseudo+0x19/0xf0 [ 635.355371] new_inode+0x1f/0x40 [ 635.358708] shmem_get_inode+0x75/0x750 [ 635.362655] __shmem_file_setup.part.0+0x111/0x400 [ 635.367559] ? __alloc_fd+0x1d4/0x4a0 [ 635.371331] ? shmem_fill_super+0x8c0/0x8c0 [ 635.375625] SyS_memfd_create+0x1f9/0x3a0 [ 635.379747] ? shmem_fcntl+0x130/0x130 [ 635.383606] ? do_syscall_64+0x53/0x640 [ 635.387556] ? shmem_fcntl+0x130/0x130 [ 635.391421] do_syscall_64+0x1e8/0x640 [ 635.395285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 635.400109] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.405268] RIP: 0033:0x459829 [ 635.408432] RSP: 002b:00007f9c10af8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 635.416124] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 635.423374] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 635.430613] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 635.437854] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9c10af96d4 [ 635.445094] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 635.461779] BTRFS error (device loop5): open_ctree failed [ 635.481766] BTRFS error (device loop5): superblock checksum mismatch 23:26:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x8001, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f0000000140)='$\x00', 0x2, 0x2) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x30, 0x4000) open_by_handle_at(r0, &(0x7f00000001c0)={0xda, 0x6, "460076132865dc86a4247e06db4176b7445a899a3385c679a3ff2bd1b5ae070c726bee8649683ac504430cd8bb853e6f6809104f5968407bad67a2d09556bfaabaefa8d5301be92e2642ca0eeb8b4e007fe9d1b15b77e10948b4d68b836290ff33514210d4c53ce58d3ca99f81209c4386810846aaf17d0b283df28096acf0521370fba41ebebf287690845cd81d20782699d9fe957a8be3a13910bb60c0095bdf2c1d66ab7414ba116668a9deac9082882ef36641c40bede602fdb65f354077e7465ce6da562e0a9ca257ec2af354d1f4f6"}, 0x40) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00') 23:26:28 executing program 2 (fault-call:3 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:28 executing program 0 (fault-call:6 fault-nth:11): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:28 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 635.520640] BTRFS error (device loop5): open_ctree failed [ 635.539994] FAULT_INJECTION: forcing a failure. [ 635.539994] name failslab, interval 1, probability 0, space 0, times 0 [ 635.555848] CPU: 0 PID: 16691 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 635.562945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.562950] Call Trace: [ 635.562964] dump_stack+0x138/0x19c [ 635.562979] should_fail.cold+0x10f/0x159 [ 635.562995] should_failslab+0xdb/0x130 [ 635.563007] kmem_cache_alloc+0x2d7/0x780 [ 635.563018] ? __alloc_fd+0x1d4/0x4a0 [ 635.563031] __d_alloc+0x2d/0x9f0 [ 635.563039] ? lock_downgrade+0x6e0/0x6e0 [ 635.563051] d_alloc_pseudo+0x1e/0x30 [ 635.563061] __shmem_file_setup.part.0+0xd8/0x400 [ 635.563068] ? __alloc_fd+0x1d4/0x4a0 [ 635.563077] ? shmem_fill_super+0x8c0/0x8c0 23:26:29 executing program 2 (fault-call:3 fault-nth:2): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 635.563092] SyS_memfd_create+0x1f9/0x3a0 [ 635.563101] ? shmem_fcntl+0x130/0x130 [ 635.563109] ? do_syscall_64+0x53/0x640 [ 635.563117] ? shmem_fcntl+0x130/0x130 [ 635.563128] do_syscall_64+0x1e8/0x640 [ 635.563140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 635.575037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.575047] RIP: 0033:0x459829 [ 635.582764] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 635.582774] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 635.582779] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 635.582784] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 635.582789] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3f2243e6d4 [ 635.582793] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 635.588988] FAULT_INJECTION: forcing a failure. [ 635.588988] name failslab, interval 1, probability 0, space 0, times 0 [ 635.596753] FAULT_INJECTION: forcing a failure. [ 635.596753] name failslab, interval 1, probability 0, space 0, times 0 [ 635.644262] CPU: 1 PID: 16696 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 635.652335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.652339] Call Trace: [ 635.652350] dump_stack+0x138/0x19c [ 635.652365] should_fail.cold+0x10f/0x159 [ 635.652379] should_failslab+0xdb/0x130 [ 635.652389] kmem_cache_alloc+0x2d7/0x780 [ 635.652400] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 635.652410] ? check_preemption_disabled+0x3c/0x250 [ 635.667344] selinux_file_alloc_security+0xb4/0x190 [ 635.667357] security_file_alloc+0x6d/0xa0 [ 635.667382] get_empty_filp+0x162/0x3f0 [ 635.667390] path_openat+0x8f/0x3f70 [ 635.667402] ? trace_hardirqs_on+0x10/0x10 [ 635.681899] ? check_preemption_disabled+0x3c/0x250 [ 635.681914] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 635.681922] ? find_held_lock+0x35/0x130 [ 635.681930] ? save_trace+0x290/0x290 [ 635.681941] ? __alloc_fd+0x1d4/0x4a0 [ 635.681950] do_filp_open+0x18e/0x250 [ 635.681958] ? may_open_dev+0xe0/0xe0 [ 635.681968] ? lock_downgrade+0x6e0/0x6e0 [ 635.681980] ? _raw_spin_unlock+0x2d/0x50 [ 635.681988] ? __alloc_fd+0x1d4/0x4a0 [ 635.682006] do_sys_open+0x2c5/0x430 [ 635.682015] ? filp_open+0x70/0x70 [ 635.682021] ? fput+0xd4/0x150 [ 635.682031] ? SyS_pwrite64+0xca/0x140 [ 635.696526] SyS_open+0x2d/0x40 [ 635.696534] ? do_sys_open+0x430/0x430 [ 635.696544] do_syscall_64+0x1e8/0x640 [ 635.696552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 635.696569] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.718867] RIP: 0033:0x413711 [ 635.718871] RSP: 002b:00007fbbdbe66a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 635.718881] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 635.718886] RDX: 00007fbbdbe66b0a RSI: 0000000000000002 RDI: 00007fbbdbe66b00 [ 635.718890] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 635.718895] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 635.718900] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 635.767958] FAULT_INJECTION: forcing a failure. [ 635.767958] name failslab, interval 1, probability 0, space 0, times 0 [ 635.769718] CPU: 1 PID: 16698 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 635.926919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.936342] Call Trace: [ 635.938915] dump_stack+0x138/0x19c [ 635.942530] should_fail.cold+0x10f/0x159 [ 635.946662] should_failslab+0xdb/0x130 [ 635.950621] kmem_cache_alloc+0x2d7/0x780 [ 635.954752] ? shmem_alloc_inode+0x1c/0x50 [ 635.958967] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 635.964400] selinux_inode_alloc_security+0xb6/0x2a0 [ 635.969485] security_inode_alloc+0x94/0xd0 [ 635.973798] inode_init_always+0x552/0xaf0 [ 635.978020] alloc_inode+0x81/0x180 [ 635.981631] new_inode_pseudo+0x19/0xf0 [ 635.985598] new_inode+0x1f/0x40 [ 635.988949] shmem_get_inode+0x75/0x750 [ 635.992917] __shmem_file_setup.part.0+0x111/0x400 [ 635.997835] ? __alloc_fd+0x1d4/0x4a0 [ 636.001619] ? shmem_fill_super+0x8c0/0x8c0 [ 636.005933] SyS_memfd_create+0x1f9/0x3a0 [ 636.010063] ? shmem_fcntl+0x130/0x130 [ 636.014410] ? do_syscall_64+0x53/0x640 [ 636.018380] ? shmem_fcntl+0x130/0x130 23:26:29 executing program 0 (fault-call:6 fault-nth:12): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 636.022251] do_syscall_64+0x1e8/0x640 [ 636.026118] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.030942] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.036112] RIP: 0033:0x459829 [ 636.039372] RSP: 002b:00007f9c10af8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 636.047063] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 636.054316] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 636.061569] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 636.068819] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9c10af96d4 [ 636.076067] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 636.083334] CPU: 0 PID: 16710 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 636.087474] FAULT_INJECTION: forcing a failure. [ 636.087474] name failslab, interval 1, probability 0, space 0, times 0 [ 636.090419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.090422] Call Trace: [ 636.090432] dump_stack+0x138/0x19c [ 636.090444] should_fail.cold+0x10f/0x159 [ 636.090454] should_failslab+0xdb/0x130 [ 636.090467] kmem_cache_alloc+0x2d7/0x780 [ 636.129285] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 636.134718] ? rcu_read_lock_sched_held+0x110/0x130 [ 636.139720] ? shmem_destroy_callback+0xa0/0xa0 [ 636.144370] shmem_alloc_inode+0x1c/0x50 [ 636.148409] alloc_inode+0x64/0x180 [ 636.152013] new_inode_pseudo+0x19/0xf0 [ 636.155968] new_inode+0x1f/0x40 [ 636.159313] shmem_get_inode+0x75/0x750 [ 636.163267] __shmem_file_setup.part.0+0x111/0x400 [ 636.168173] ? __alloc_fd+0x1d4/0x4a0 [ 636.171950] ? shmem_fill_super+0x8c0/0x8c0 [ 636.176259] SyS_memfd_create+0x1f9/0x3a0 [ 636.180387] ? shmem_fcntl+0x130/0x130 [ 636.184255] ? do_syscall_64+0x53/0x640 [ 636.188208] ? shmem_fcntl+0x130/0x130 [ 636.192075] do_syscall_64+0x1e8/0x640 [ 636.195944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.200771] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.205940] RIP: 0033:0x459829 [ 636.209107] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 636.216791] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 636.224037] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 636.231285] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 636.238533] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3f2243e6d4 [ 636.245788] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 636.253054] CPU: 1 PID: 16713 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 636.260137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.269472] Call Trace: [ 636.272043] dump_stack+0x138/0x19c [ 636.275650] should_fail.cold+0x10f/0x159 [ 636.279773] should_failslab+0xdb/0x130 [ 636.283721] kmem_cache_alloc+0x2d7/0x780 [ 636.287845] __d_alloc+0x2d/0x9f0 [ 636.291267] ? save_trace+0x290/0x290 [ 636.295042] d_alloc+0x4d/0x270 [ 636.298295] d_alloc_parallel+0xe5/0x1800 [ 636.302415] ? lock_downgrade+0x6e0/0x6e0 [ 636.306536] ? __d_lookup_rcu+0x630/0x630 [ 636.310657] ? d_lookup+0xe5/0x240 [ 636.314169] ? d_lookup+0x166/0x240 [ 636.317771] lookup_open+0x493/0x1860 [ 636.321540] ? save_trace+0x290/0x290 [ 636.325319] ? complete_walk+0x1f0/0x1f0 [ 636.329355] path_openat+0x193b/0x3f70 [ 636.333213] ? trace_hardirqs_on+0x10/0x10 [ 636.337423] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 636.342064] ? find_held_lock+0x35/0x130 [ 636.346097] ? save_trace+0x290/0x290 [ 636.349871] ? __alloc_fd+0x1d4/0x4a0 [ 636.353645] do_filp_open+0x18e/0x250 [ 636.357424] ? may_open_dev+0xe0/0xe0 [ 636.361202] ? _raw_spin_unlock+0x2d/0x50 [ 636.365318] ? __alloc_fd+0x1d4/0x4a0 [ 636.369093] do_sys_open+0x2c5/0x430 [ 636.372780] ? filp_open+0x70/0x70 [ 636.376289] ? fput+0xd4/0x150 [ 636.379451] ? SyS_pwrite64+0xca/0x140 [ 636.383313] SyS_open+0x2d/0x40 [ 636.386565] ? do_sys_open+0x430/0x430 [ 636.390425] do_syscall_64+0x1e8/0x640 [ 636.394281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.399095] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.404252] RIP: 0033:0x413711 [ 636.407414] RSP: 002b:00007fbbdbe66a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 636.415091] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 23:26:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000080)={0x0, "ce24173e2fa6f786d5d0c83d9578f364077efcdaa9fa60e31305e971b4c0e564", 0x2, 0x4f1e, 0x7, 0x10, 0x5}) semget$private(0x0, 0x4, 0x200) 23:26:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000200), &(0x7f00000001c0)=0xfe79) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:29 executing program 2 (fault-call:3 fault-nth:3): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:29 executing program 0 (fault-call:6 fault-nth:13): mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:29 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x20, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 636.422334] RDX: 00007fbbdbe66b0a RSI: 0000000000000002 RDI: 00007fbbdbe66b00 [ 636.429576] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 636.436818] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 636.444062] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1, 0x7) r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) 23:26:29 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) 23:26:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 636.536058] BTRFS error (device loop1): superblock checksum mismatch [ 636.570164] BTRFS error (device loop1): open_ctree failed 23:26:29 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clock_gettime(0x0, &(0x7f0000004c00)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004b00)=[{{&(0x7f0000000240)=@nfc, 0x80, &(0x7f00000020c0)=[{&(0x7f0000000600)=""/182, 0xb6}, {&(0x7f00000002c0)=""/20, 0x14}, {&(0x7f00000006c0)=""/226, 0xe2}, {&(0x7f00000007c0)=""/65, 0x41}, {&(0x7f0000000e00)=""/202, 0xca}, {&(0x7f0000000f00)=""/254, 0xfe}, {&(0x7f0000001000)=""/184, 0xb8}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f0000000840)=""/48, 0x30}], 0x9, &(0x7f0000002180)=""/190, 0xbe}, 0x1}, {{&(0x7f0000002240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000880)=[{&(0x7f00000022c0)=""/175, 0xaf}, {&(0x7f0000002380)=""/150, 0x96}, {&(0x7f0000002440)=""/127, 0x7f}, {&(0x7f00000024c0)=""/94, 0x5e}], 0x4, &(0x7f0000002540)=""/182, 0xb6}, 0x3}, {{&(0x7f0000002600)=@ax25={{0x3, @default}, [@bcast, @remote, @default, @netrom, @rose, @rose, @bcast, @rose]}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000002680)=""/77, 0x4d}, {&(0x7f0000002700)=""/4096, 0x1000}, {&(0x7f0000003700)=""/38, 0x26}, {&(0x7f0000003740)=""/72, 0x48}], 0x4, &(0x7f0000003800)=""/24, 0x18}, 0x6}, {{&(0x7f0000003840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004ac0)=[{&(0x7f00000038c0)=""/4096, 0x1000}, {&(0x7f00000048c0)=""/171, 0xab}, {&(0x7f0000004980)=""/252, 0xfc}, {&(0x7f0000004a80)=""/12, 0xc}], 0x4}, 0x101}], 0x4, 0x10020, &(0x7f0000004c40)={r1, r2+10000000}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000004cc0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000004d80)={&(0x7f0000004c80)={0x10, 0x0, 0x0, 0x4048000}, 0xc, &(0x7f0000004d40)={&(0x7f0000004d00)={0x1c, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8014) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6669ec746572000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000764b33b384412a2058e1adab0538541a8d057413831daec2678baaaaec6b6ae674f8d6a879a3e017e9096d1e94e2a8bd6b0d2e6df6ac7d6fcc1d1e370cbe727d4b7fe9e66994468bb925ed96216d2a8953e56f6913293c9941bd1bec7900052c0b87d330c3fde00"/207], 0x68) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x4, 0x0, [], [{0x8001, 0x6, 0x1, 0x2, 0x2, 0x8000}, {0xfffffffffffffffa, 0x0, 0x52e5, 0x38, 0x237, 0x5}], [[], [], [], []]}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000140)=@req={0x20, 0x9, 0x7c, 0x5}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000940)=@filter={'filter\x00', 0xe, 0x4, 0x438, 0x230, 0x138, 0x138, 0x230, 0x230, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x373b57f7, [0x8000, 0xfffffffffffffff7, 0x8, 0xbb0, 0x2, 0x1], 0xfffffffffffffffe, 0xc44}}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 0xfffffffffffffffb, 0x10, [0x4, 0x3c, 0x31, 0xe, 0x3, 0x28, 0x6, 0x2f, 0x2e, 0x24, 0x29, 0x4, 0x6, 0x20, 0x22, 0x1b], 0x2, 0x9, 0x4}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0xb}, @multicast2, 0x0, 0xff, 'bridge_slave_1\x00', 'bpq0\x00', {0xff}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x57, 0x0, 0x7, 0x2400, 0x3], 0x1, 0x4e00}, {0x8001, [0x7, 0x2, 0x7fffffff, 0x4c, 0x5, 0x7955], 0x40, 0x287}}}}, {{@uncond, 0x0, 0x110, 0x170, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x2}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0xffffffff, 0x4, 0x2, 0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x8001, [0x3, 0x1, 0x3, 0xffff, 0x100, 0x81], 0xfffffffffffffffa, 0x9}, {0x9, [0x7, 0x0, 0x5, 0x0, 0x2, 0x7fffffff], 0x8, 0xfffffffffffffffd}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 23:26:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x30, 0x200) rt_sigpending(&(0x7f0000000140), 0x8) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x7fff, 0x480) syz_mount_image$btrfs(&(0x7f0000000280)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000300), 0xf43, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000180)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}, 0x1}) [ 636.602395] FAULT_INJECTION: forcing a failure. [ 636.602395] name failslab, interval 1, probability 0, space 0, times 0 [ 636.646215] BTRFS error (device loop3): superblock checksum mismatch [ 636.655034] CPU: 1 PID: 16738 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 636.662143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.671482] Call Trace: [ 636.674062] dump_stack+0x138/0x19c [ 636.677677] should_fail.cold+0x10f/0x159 [ 636.681811] should_failslab+0xdb/0x130 [ 636.685764] kmem_cache_alloc+0x2d7/0x780 [ 636.689882] ? shmem_alloc_inode+0x1c/0x50 [ 636.694088] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 636.699509] selinux_inode_alloc_security+0xb6/0x2a0 [ 636.704585] security_inode_alloc+0x94/0xd0 [ 636.708880] inode_init_always+0x552/0xaf0 [ 636.713086] alloc_inode+0x81/0x180 [ 636.716687] new_inode_pseudo+0x19/0xf0 [ 636.720636] new_inode+0x1f/0x40 [ 636.723980] shmem_get_inode+0x75/0x750 [ 636.727925] __shmem_file_setup.part.0+0x111/0x400 [ 636.732827] ? __alloc_fd+0x1d4/0x4a0 [ 636.736601] ? shmem_fill_super+0x8c0/0x8c0 [ 636.740904] SyS_memfd_create+0x1f9/0x3a0 [ 636.745028] ? shmem_fcntl+0x130/0x130 [ 636.748890] ? do_syscall_64+0x53/0x640 [ 636.752833] ? shmem_fcntl+0x130/0x130 [ 636.756698] do_syscall_64+0x1e8/0x640 [ 636.760562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.765391] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.770560] RIP: 0033:0x459829 [ 636.773743] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 636.781428] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 636.788675] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 23:26:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 23:26:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000280)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x6, 0x400) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000140)={0x6, 0x5, 0x1, {0xf, @raw_data="f4628d8aebacc27549bd82582d0f0a296df352aac0c9afccac80ac5a2106e0713468eadb8b4d12dfa4890c020be96805d028f6374a72102ec8d0bb8d2bcd46bb8feca8a9d6cf8ba0e9542b23c86c7ed72b0d888abc793c051413774397b325abd0492aaf38a58a7a79ca08624a6d96c1240ed27a68891ad07d1319409c1d913acf73829e29ebf9f59c00f40e00043dc09b3fe376bdfdf2beb45fa4563b97d1614f2669fae3ce1b835813bbabd4cec3679133130129ebcc1786a0a4b6e4c1f875901bf84dd5ad2e08"}}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x154, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 23:26:30 executing program 2 (fault-call:3 fault-nth:4): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 636.795917] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 636.803158] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3f2243e6d4 [ 636.810402] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 636.860818] BTRFS error (device loop3): open_ctree failed [ 636.885537] FAULT_INJECTION: forcing a failure. [ 636.885537] name failslab, interval 1, probability 0, space 0, times 0 [ 636.897004] CPU: 0 PID: 16765 Comm: syz-executor.2 Not tainted 4.14.139 #35 23:26:30 executing program 2 (fault-call:3 fault-nth:5): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 636.904095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.904099] Call Trace: [ 636.904114] dump_stack+0x138/0x19c [ 636.904130] should_fail.cold+0x10f/0x159 [ 636.904146] should_failslab+0xdb/0x130 [ 636.904156] kmem_cache_alloc+0x2d7/0x780 [ 636.904169] ? lock_downgrade+0x6e0/0x6e0 [ 636.904185] get_empty_filp+0x8c/0x3f0 [ 636.904196] alloc_file+0x23/0x440 [ 636.904208] __shmem_file_setup.part.0+0x1b1/0x400 [ 636.904216] ? __alloc_fd+0x1d4/0x4a0 [ 636.904225] ? shmem_fill_super+0x8c0/0x8c0 [ 636.904240] SyS_memfd_create+0x1f9/0x3a0 [ 636.904249] ? shmem_fcntl+0x130/0x130 [ 636.904256] ? do_syscall_64+0x53/0x640 [ 636.904265] ? shmem_fcntl+0x130/0x130 [ 636.904275] do_syscall_64+0x1e8/0x640 [ 636.904283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.904297] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.904303] RIP: 0033:0x459829 [ 636.904307] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 636.904316] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 636.904321] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 636.904329] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 636.916219] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3f2243e6d4 [ 636.916224] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 637.006095] FAULT_INJECTION: forcing a failure. [ 637.006095] name failslab, interval 1, probability 0, space 0, times 0 [ 637.054515] BTRFS error (device loop1): superblock checksum mismatch [ 637.065285] CPU: 1 PID: 16774 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 637.072382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.081719] Call Trace: [ 637.084299] dump_stack+0x138/0x19c [ 637.087920] should_fail.cold+0x10f/0x159 [ 637.092060] should_failslab+0xdb/0x130 [ 637.096028] kmem_cache_alloc+0x2d7/0x780 [ 637.100165] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 637.105615] ? check_preemption_disabled+0x3c/0x250 [ 637.110625] selinux_file_alloc_security+0xb4/0x190 [ 637.115632] security_file_alloc+0x6d/0xa0 [ 637.119859] get_empty_filp+0x162/0x3f0 [ 637.123818] alloc_file+0x23/0x440 [ 637.127345] __shmem_file_setup.part.0+0x1b1/0x400 [ 637.132262] ? __alloc_fd+0x1d4/0x4a0 [ 637.136055] ? shmem_fill_super+0x8c0/0x8c0 [ 637.140371] SyS_memfd_create+0x1f9/0x3a0 [ 637.144504] ? shmem_fcntl+0x130/0x130 [ 637.148362] ? do_syscall_64+0x53/0x640 [ 637.152311] ? shmem_fcntl+0x130/0x130 [ 637.156178] do_syscall_64+0x1e8/0x640 [ 637.160052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.164876] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.170039] RIP: 0033:0x459829 [ 637.173204] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 637.180889] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459829 [ 637.188144] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be748 [ 637.195396] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 637.202644] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f3f2243e6d4 23:26:30 executing program 2 (fault-call:3 fault-nth:6): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 637.209893] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 637.231006] BTRFS error (device loop1): open_ctree failed [ 637.239180] BTRFS error (device loop1): superblock checksum mismatch [ 637.291221] FAULT_INJECTION: forcing a failure. [ 637.291221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 637.303531] BTRFS error (device loop1): open_ctree failed [ 637.309180] CPU: 0 PID: 16791 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 637.316264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.316268] Call Trace: [ 637.316282] dump_stack+0x138/0x19c [ 637.316298] should_fail.cold+0x10f/0x159 [ 637.316309] ? __might_sleep+0x93/0xb0 23:26:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x39f, &(0x7f0000000000), 0xf43, 0x0) 23:26:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000140)={0x10f, 0x29, 0x1, {0x3, [{{0x0, 0x0, 0x5}, 0x6de, 0x1, 0x7, './file0'}, {{0x20, 0x0, 0x7}, 0xffffffff80000001, 0x10001, 0x7, './file0'}, {{0x0, 0x0, 0x5}, 0x0, 0x1, 0xd, './file0/file0'}, {{0x10, 0x0, 0x5}, 0x6, 0x8, 0x7, './file1'}, {{0x1c, 0x4, 0x6}, 0x5, 0x4, 0x7, './file0'}, {{0xc, 0x1, 0x2}, 0x975, 0x1b84, 0x7, './file0'}, {{0x6, 0x2, 0x8}, 0x1, 0xffff, 0xd, './file0/file0'}, {{0x40, 0x2, 0x5}, 0x9, 0x0, 0x7, './file0'}]}}, 0x10f) write$P9_RLERROR(r1, &(0x7f0000000100)={0x11, 0x7, 0x1, {0x8, '{keyring'}}, 0x11) r2 = syz_open_dev$sndseq(&(0x7f00000005c0)='/dev/snd/seq\x00', 0x0, 0x40) stat(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000007c0)=0xe8) fstat(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f0000000940)=0xc) mount$9p_fd(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x284000, &(0x7f0000000980)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag'}}, {@cache_loose='cache=loose'}, {@version_9p2000='version=9p2000'}, {@access_uid={'access', 0x3d, r3}}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@access_uid={'access', 0x3d, r5}}, {@nodevmap='nodevmap'}, {@access_uid={'access', 0x3d, r6}}], [{@dont_hash='dont_hash'}]}}) [ 637.316325] __alloc_pages_nodemask+0x1d6/0x7a0 [ 637.328214] ? __alloc_pages_slowpath+0x2930/0x2930 [ 637.328224] ? lock_downgrade+0x6e0/0x6e0 [ 637.328242] alloc_pages_vma+0xc9/0x4c0 [ 637.328255] shmem_alloc_page+0xf6/0x1a0 [ 637.335971] ? shmem_swapin+0x1a0/0x1a0 [ 637.335983] ? cred_has_capability+0x142/0x290 [ 637.335994] ? check_preemption_disabled+0x3c/0x250 [ 637.336006] ? __this_cpu_preempt_check+0x1d/0x30 [ 637.336015] ? percpu_counter_add_batch+0x112/0x160 [ 637.336027] ? __vm_enough_memory+0x26a/0x490 [ 637.344534] shmem_alloc_and_acct_page+0x12a/0x680 [ 637.344546] shmem_getpage_gfp+0x3e7/0x25d0 [ 637.344564] ? shmem_add_to_page_cache+0x860/0x860 [ 637.344575] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 637.344587] shmem_write_begin+0xfd/0x1b0 [ 637.344594] ? trace_hardirqs_on_caller+0x400/0x590 [ 637.344604] generic_perform_write+0x1f8/0x480 [ 637.353711] ? page_endio+0x530/0x530 [ 637.353720] ? current_time+0xb0/0xb0 [ 637.353730] ? generic_file_write_iter+0x9a/0x660 [ 637.353740] __generic_file_write_iter+0x239/0x5b0 [ 637.353751] generic_file_write_iter+0x303/0x660 [ 637.353765] __vfs_write+0x4a7/0x6b0 [ 637.447992] ? selinux_file_open+0x420/0x420 [ 637.452386] ? kernel_read+0x120/0x120 [ 637.456251] ? check_preemption_disabled+0x3c/0x250 [ 637.461248] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 637.466707] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 637.471454] ? __sb_start_write+0x153/0x2f0 [ 637.475747] vfs_write+0x198/0x500 [ 637.479261] SyS_pwrite64+0x115/0x140 [ 637.483030] ? SyS_pread64+0x140/0x140 [ 637.486891] ? do_syscall_64+0x53/0x640 [ 637.490841] ? SyS_pread64+0x140/0x140 [ 637.494706] do_syscall_64+0x1e8/0x640 [ 637.498567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.503382] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.508541] RIP: 0033:0x413777 [ 637.511704] RSP: 002b:00007f3f2243da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 637.519381] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 637.526619] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 [ 637.533861] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 23:26:30 executing program 0: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x800, @ipv4={[], [], @multicast2}, 0x1ff}}, [0x101, 0xfffffffffffffff7, 0x4, 0x7fffffff, 0x8, 0xfff, 0x8, 0x2, 0x73cb, 0x8, 0x4, 0x9, 0x6, 0x3f, 0x5]}, &(0x7f0000000340)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={r1, @in={{0x2, 0x4e24, @local}}, 0x0, 0x8fc2, 0x6, 0xffffffff, 0x3}, &(0x7f0000000440)=0x98) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r2 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x4, 0x89, 0x80000000}) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 637.541103] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 637.548349] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x4) 23:26:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 23:26:31 executing program 2 (fault-call:3 fault-nth:7): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 637.677773] BTRFS error (device loop1): superblock checksum mismatch [ 637.717206] FAULT_INJECTION: forcing a failure. [ 637.717206] name failslab, interval 1, probability 0, space 0, times 0 [ 637.728392] CPU: 0 PID: 16823 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 637.728399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.728404] Call Trace: [ 637.728417] dump_stack+0x138/0x19c [ 637.728432] should_fail.cold+0x10f/0x159 [ 637.744848] should_failslab+0xdb/0x130 [ 637.744859] kmem_cache_alloc+0x47/0x780 [ 637.744869] ? __alloc_pages_slowpath+0x2930/0x2930 [ 637.744877] ? lock_downgrade+0x6e0/0x6e0 [ 637.744891] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 637.744901] __radix_tree_create+0x337/0x4d0 [ 637.782225] __radix_tree_insert+0xab/0x570 [ 637.786521] ? __radix_tree_create+0x4d0/0x4d0 [ 637.791169] shmem_add_to_page_cache+0x5a4/0x860 [ 637.795895] ? shmem_writepage+0xbb0/0xbb0 [ 637.800097] ? __radix_tree_preload+0x1d2/0x260 [ 637.804736] shmem_getpage_gfp+0x1757/0x25d0 [ 637.809125] ? shmem_add_to_page_cache+0x860/0x860 [ 637.814023] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 637.819186] shmem_write_begin+0xfd/0x1b0 [ 637.823309] ? trace_hardirqs_on_caller+0x400/0x590 [ 637.828298] generic_perform_write+0x1f8/0x480 [ 637.832854] ? page_endio+0x530/0x530 [ 637.836628] ? current_time+0xb0/0xb0 [ 637.840409] ? generic_file_write_iter+0x9a/0x660 [ 637.845237] __generic_file_write_iter+0x239/0x5b0 [ 637.850145] generic_file_write_iter+0x303/0x660 [ 637.854871] __vfs_write+0x4a7/0x6b0 [ 637.858564] ? selinux_file_open+0x420/0x420 [ 637.862955] ? kernel_read+0x120/0x120 [ 637.866818] ? check_preemption_disabled+0x3c/0x250 [ 637.871806] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 637.877238] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 637.881973] ? __sb_start_write+0x153/0x2f0 [ 637.886266] vfs_write+0x198/0x500 [ 637.889778] SyS_pwrite64+0x115/0x140 [ 637.893550] ? SyS_pread64+0x140/0x140 [ 637.897408] ? do_syscall_64+0x53/0x640 [ 637.901355] ? SyS_pread64+0x140/0x140 [ 637.905212] do_syscall_64+0x1e8/0x640 [ 637.909067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.913884] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.919046] RIP: 0033:0x413777 [ 637.922215] RSP: 002b:00007f3f2243da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 637.929894] RAX: ffffffffffffffda RBX: 0000000020000010 RCX: 0000000000413777 [ 637.937135] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 [ 637.944378] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 637.951623] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 637.958863] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:31 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x480, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000440)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000480)=0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8, 0x42081) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000180)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x10, &(0x7f00000002c0)={&(0x7f0000000940)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000380)={&(0x7f00000001c0)=""/216, 0xd8, r4}}, 0x10) ioctl(r2, 0x1000008916, &(0x7f00000000c0)="11dca501003e355b8af070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 637.975034] BTRFS error (device loop1): open_ctree failed [ 637.989553] BTRFS error (device loop1): superblock checksum mismatch 23:26:31 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/context\x00', 0x2, 0x0) 23:26:31 executing program 2 (fault-call:3 fault-nth:8): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 23:26:31 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='btrfs\x00', &(0x7f0000000280)='btrfs\x00', &(0x7f00000002c0)='btrfs\x00', &(0x7f0000000340)='securitycgroupvmnet0:#:\x00', &(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='btrfs\x00'], 0x800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 638.100152] BTRFS error (device loop1): open_ctree failed [ 638.117079] BTRFS error (device loop1): superblock checksum mismatch [ 638.186897] FAULT_INJECTION: forcing a failure. [ 638.186897] name failslab, interval 1, probability 0, space 0, times 0 [ 638.198923] CPU: 0 PID: 16869 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 638.206016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.215347] Call Trace: [ 638.217912] dump_stack+0x138/0x19c [ 638.221518] should_fail.cold+0x10f/0x159 [ 638.225643] should_failslab+0xdb/0x130 [ 638.229592] kmem_cache_alloc+0x2d7/0x780 [ 638.233714] ? vfs_write+0x25f/0x500 [ 638.237405] getname_flags+0xcb/0x580 [ 638.241175] ? check_preemption_disabled+0x3c/0x250 [ 638.246161] getname+0x1a/0x20 [ 638.249325] do_sys_open+0x1e7/0x430 [ 638.253010] ? filp_open+0x70/0x70 [ 638.256522] ? fput+0xd4/0x150 [ 638.259686] ? SyS_pwrite64+0xca/0x140 [ 638.263548] SyS_open+0x2d/0x40 [ 638.266798] ? do_sys_open+0x430/0x430 [ 638.270656] do_syscall_64+0x1e8/0x640 [ 638.274514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.279332] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 638.284498] RIP: 0033:0x413711 [ 638.287661] RSP: 002b:00007f3f2243da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 638.295340] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 638.302580] RDX: 00007f3f2243db0a RSI: 0000000000000002 RDI: 00007f3f2243db00 [ 638.309822] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 638.317075] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 638.324317] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 638.400410] BTRFS error (device loop1): open_ctree failed [ 638.409513] BTRFS error (device loop3): superblock checksum mismatch [ 638.461235] BTRFS error (device loop3): open_ctree failed [ 638.470165] BTRFS error (device loop3): superblock checksum mismatch [ 638.480079] net_ratelimit: 26 callbacks suppressed [ 638.480083] protocol 88fb is buggy, dev hsr_slave_0 [ 638.485061] protocol 88fb is buggy, dev hsr_slave_1 [ 638.495098] protocol 88fb is buggy, dev hsr_slave_0 [ 638.500169] protocol 88fb is buggy, dev hsr_slave_1 23:26:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200000, &(0x7f0000000140)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="8da4363ac0000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x45, 0x10000}], 0xdfd698f76df8fd1f, 0x0) 23:26:31 executing program 2 (fault-call:3 fault-nth:9): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:31 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 23:26:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000940)) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000000c0)={0x1, 0x4}) 23:26:31 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x200, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r0, 0x0, 0x6, &(0x7f0000000400)='btrfs\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0xcb, 0x81, 0x4, 0xffffffffffffff06, 0x0, 0x1f0000, 0x20, 0x2, 0x8, 0x15c, 0x7fffffff, 0x20, 0x10001, 0x2, 0x9be, 0x8, 0x8000, 0x5, 0x3, 0x5, 0x100000000, 0x4, 0x14, 0x2, 0x0, 0x6, 0x5, 0x1, 0x100000001, 0x7fff, 0x6, 0x100, 0x3f, 0x7, 0xa4d5, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0x1ff, 0x341}, 0xa00, 0x0, 0xffffffff, 0x6, 0x3, 0x10000, 0xfffffffffffffffa}, r1, 0x10, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000280)={0x6, 0x3, 0x3, {0x2, @pix={0xf800000000000000, 0x3, 0x41564e57, 0x1, 0xffffffffffffffe1, 0x800, 0x3b64b36d0c70a152, 0xfff, 0x1, 0x3, 0x1, 0x5}}}) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000001c0)={0x0, @bt={0x6, 0x1ff, 0x1, 0x2, 0x180000, 0xe0, 0x7ca, 0x4, 0x3, 0x9, 0x4, 0x7, 0x621, 0x8, 0x4, 0x1}}) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000180)={0x0, 0x7, 0x100000000, [], &(0x7f0000000140)=0x100000001}) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000540)={'hwsim0\x00', 0x1, 0x7}) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b04920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000500)='TRUE', 0x4, 0x2) [ 638.540179] BTRFS error (device loop3): open_ctree failed [ 638.586597] FAULT_INJECTION: forcing a failure. [ 638.586597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 638.598483] CPU: 1 PID: 16895 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 638.605566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.605571] Call Trace: [ 638.605587] dump_stack+0x138/0x19c [ 638.605604] should_fail.cold+0x10f/0x159 [ 638.617497] __alloc_pages_nodemask+0x1d6/0x7a0 [ 638.625212] ? fs_reclaim_acquire+0x20/0x20 [ 638.625224] ? __alloc_pages_slowpath+0x2930/0x2930 [ 638.625241] cache_grow_begin+0x80/0x400 [ 638.634176] kmem_cache_alloc+0x6a6/0x780 [ 638.642098] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b04920efd9a [ 638.643204] ? vfs_write+0x25f/0x500 [ 638.643218] getname_flags+0xcb/0x580 [ 638.643227] ? check_preemption_disabled+0x3c/0x250 [ 638.643236] getname+0x1a/0x20 [ 638.648531] devid 0 transid 0 /dev/loop3 [ 638.653824] do_sys_open+0x1e7/0x430 [ 638.653835] ? filp_open+0x70/0x70 [ 638.653842] ? fput+0xd4/0x150 [ 638.653851] ? SyS_pwrite64+0xca/0x140 [ 638.653866] SyS_open+0x2d/0x40 [ 638.653872] ? do_sys_open+0x430/0x430 [ 638.653881] do_syscall_64+0x1e8/0x640 [ 638.653889] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.653902] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 638.653912] RIP: 0033:0x413711 [ 638.711801] RSP: 002b:00007f3f2243da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 638.719482] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 638.726722] RDX: 00007f3f2243db0a RSI: 0000000000000002 RDI: 00007f3f2243db00 23:26:32 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 638.733964] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 638.741208] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 638.748451] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) [ 638.813134] BTRFS error (device loop1): superblock checksum mismatch [ 638.824609] BTRFS error (device loop3): superblock checksum mismatch 23:26:32 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000180)=0x1, 0x4) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x40000, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)={r1}) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f00000001c0)=ANY=[@ANYBLOB='7\x00'/43]) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, &(0x7f0000000140)=0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0x7, 0x80000001, 0xfffffffffffffffe, 0x3, 0x8, 0x6, 0x1000, 0x4, 0x942d, 0x7a, 0xbb8d, 0x100000000, 0x401, 0x8, 0xcd97, 0x100000001, 0x2, 0xd59, 0x8, 0x5, 0x101, 0x4, 0x9, 0x22e0000, 0x0, 0x6, 0x40, 0x1, 0x3, 0x2, 0xfffffffffffffff7, 0x2917]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x652fd36856d248, &(0x7f0000000180), 0x0, 0x0) 23:26:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6, 0x200002) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0x60, 0x2) socket$inet(0x2, 0xa, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) 23:26:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) [ 638.863794] BTRFS error (device loop1): open_ctree failed [ 638.890868] BTRFS error (device loop3): open_ctree failed 23:26:32 executing program 2 (fault-call:3 fault-nth:10): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 638.960080] protocol 88fb is buggy, dev hsr_slave_0 [ 638.963937] BTRFS error (device loop1): superblock checksum mismatch [ 638.965139] protocol 88fb is buggy, dev hsr_slave_1 [ 638.971678] protocol 88fb is buggy, dev hsr_slave_0 [ 638.981684] protocol 88fb is buggy, dev hsr_slave_1 [ 638.996625] BTRFS error (device loop3): superblock checksum mismatch 23:26:32 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x54) [ 639.022613] FAULT_INJECTION: forcing a failure. [ 639.022613] name failslab, interval 1, probability 0, space 0, times 0 [ 639.038070] CPU: 0 PID: 16947 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 639.045170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.054508] Call Trace: [ 639.057092] dump_stack+0x138/0x19c [ 639.060716] should_fail.cold+0x10f/0x159 [ 639.064859] should_failslab+0xdb/0x130 [ 639.068824] kmem_cache_alloc+0x2d7/0x780 23:26:32 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1400008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070c8ad47e53ce53c09ddc05d50d31df64ce4e69a71991f16368a2a35bfb8871302f7ead831018bf41d86d808ccb9dc62efc38b8c1fa0bbc0dc9542f01c98d26aaf27f813fa279b708754cbb47551") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 639.072965] ? save_stack+0xa9/0xd0 [ 639.076585] get_empty_filp+0x8c/0x3f0 [ 639.080464] path_openat+0x8f/0x3f70 [ 639.084169] ? trace_hardirqs_on+0x10/0x10 [ 639.088395] ? check_preemption_disabled+0x3c/0x250 [ 639.093393] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 639.098031] ? find_held_lock+0x35/0x130 [ 639.102060] ? save_trace+0x290/0x290 [ 639.105830] ? __alloc_fd+0x1d4/0x4a0 [ 639.109601] do_filp_open+0x18e/0x250 [ 639.113373] ? may_open_dev+0xe0/0xe0 [ 639.117143] ? lock_downgrade+0x6e0/0x6e0 [ 639.121270] ? _raw_spin_unlock+0x2d/0x50 [ 639.125397] ? __alloc_fd+0x1d4/0x4a0 [ 639.129171] do_sys_open+0x2c5/0x430 [ 639.132853] ? filp_open+0x70/0x70 [ 639.136361] ? fput+0xd4/0x150 [ 639.139522] ? SyS_pwrite64+0xca/0x140 [ 639.143384] SyS_open+0x2d/0x40 [ 639.146648] ? do_sys_open+0x430/0x430 [ 639.150506] do_syscall_64+0x1e8/0x640 [ 639.154361] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.159176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 639.164336] RIP: 0033:0x413711 [ 639.167495] RSP: 002b:00007f3f2243da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 639.175172] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 639.182411] RDX: 00007f3f2243db0a RSI: 0000000000000002 RDI: 00007f3f2243db00 [ 639.189648] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 639.196894] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 639.204141] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 639.213205] BTRFS error (device loop3): open_ctree failed 23:26:32 executing program 3: r0 = msgget(0x2, 0x40) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x3, r1, r3, r4, r2, 0x100, 0x9}, 0x9691, 0x0, 0x5, 0x2, 0x400000000008000, 0x9b, r5, r5}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaa75b, &(0x7f0000000100)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x80000010000}], 0xf43, 0x0) 23:26:32 executing program 2 (fault-call:3 fault-nth:11): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 639.220125] protocol 88fb is buggy, dev hsr_slave_0 [ 639.225223] protocol 88fb is buggy, dev hsr_slave_1 23:26:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x210403, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000140)={r1, 0x80000, r2}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 23:26:32 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'ipddp0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000240)={@empty, r2}, 0x14) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x2, 0x0) accept4$nfc_llcp(r4, 0x0, &(0x7f0000000180), 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 639.280517] BTRFS error (device loop1): open_ctree failed [ 639.299313] BTRFS error (device loop5): superblock checksum mismatch 23:26:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) [ 639.348450] FAULT_INJECTION: forcing a failure. [ 639.348450] name failslab, interval 1, probability 0, space 0, times 0 [ 639.370456] BTRFS error (device loop5): open_ctree failed [ 639.384619] CPU: 0 PID: 16968 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 639.391710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.391715] Call Trace: [ 639.391731] dump_stack+0x138/0x19c [ 639.391746] should_fail.cold+0x10f/0x159 [ 639.391760] should_failslab+0xdb/0x130 [ 639.391771] kmem_cache_alloc+0x2d7/0x780 [ 639.391779] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 639.391790] ? check_preemption_disabled+0x3c/0x250 [ 639.391804] selinux_file_alloc_security+0xb4/0x190 [ 639.391814] security_file_alloc+0x6d/0xa0 [ 639.391825] get_empty_filp+0x162/0x3f0 [ 639.391833] path_openat+0x8f/0x3f70 23:26:32 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7, &(0x7f0000000500)=[{&(0x7f0000000180)="387af284a2a07e807c96a23ba64bde92bcabe184c4af62f31142b6207db07eee35b5e04dcf9b9c15fbf7559aa317f43e8e81228d98ff9642c3411d5e3c47fa2ae184b780670adc766ba5bb921e22886eac5105d8908010950511fac88a6c3476ce58ef6cdabd7763ca930f9f39dbd61fddb3bd41c8db0f6ea0cff91db07dba344c79ca07659e1836fb6755888e1f1b070adc", 0x92, 0x5}, {&(0x7f0000000240)="8b5ffb993a26ebd9788d76e1fc587846b32c5a95e66319ea077d5afb0beff8afc625a1ddea5884fc01f7d195e0fa2f7095851d853f0448c353a3578c2b054ed51bfe817085dc2146b7dce04f854495502626b3f7bd7c4008b5", 0x59, 0xfffffffffffffffe}, {&(0x7f00000002c0), 0x0, 0x9}, {&(0x7f0000000940)="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", 0x1000, 0xffffffff}, {&(0x7f0000001940)="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", 0x1000, 0x3}, {&(0x7f0000000340)="9755fa69d29805c871d8152a0a3ec65c5e0911a9a13f94a44dd32fb4c1beb9cf352be813fe11f3cece4a791fd4d40ff4caba0fd7903a92bafc10d3299b570359b19b65a8b0fbfc3f1db532c8959214a9c142601cfa0ded3a1e3551e8a507cecac71729fbb07d7ac2759bd8dda31aa28434e425f94befefa9bb4a96be7e486930945e47f36adf4c54be8c03bec633155784d1a05a6ac88c5c968edd15d9a1c2b44759dddeaaf0c662de", 0xa9, 0xffff}, {&(0x7f0000000400)="ef11f8ef54bea75718a7c640213fae4a34e76fcc925de9f0c6476d73d4cedec09a6871e4b4a92b0c22e09eefc359c98d472fb6d80784992caa46a3bcd6a46750f5bdecb703a2d2067173eb43b6fb7562b52cbcadfa7dbada04547ffdf68ce53e32ee1894d1fe789588da1589edd018b3e5c960cfed606d145a312bd6d8ed5b9711558b565c46f47eb2f4b37894b9883a4c901eacb09ceee15bc715f78a4072904cd55ddffa8e4a22bb2e20b6b8cbb9b7e608678df59497db523e11dad2e53d58b95083d9ec3bb31e085b582b93bf46b6301b5add4d8f1906805d1705aee78409a160a118234d197e1ced4da61aca51403b567ad4da1d", 0xf6, 0x2}], 0x1880000, &(0x7f00000005c0)={[{@inode_cache='inode_cache'}, {@nodatasum='nodatasum'}, {@space_cache_v1='space_cache=v1'}]}) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 639.391844] ? trace_hardirqs_on+0x10/0x10 [ 639.391857] ? check_preemption_disabled+0x3c/0x250 [ 639.411479] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 639.411488] ? find_held_lock+0x35/0x130 [ 639.411497] ? save_trace+0x290/0x290 [ 639.411506] ? __alloc_fd+0x1d4/0x4a0 [ 639.411516] do_filp_open+0x18e/0x250 [ 639.419582] ? may_open_dev+0xe0/0xe0 [ 639.419594] ? lock_downgrade+0x6e0/0x6e0 [ 639.419608] ? _raw_spin_unlock+0x2d/0x50 [ 639.419614] ? __alloc_fd+0x1d4/0x4a0 [ 639.419630] do_sys_open+0x2c5/0x430 [ 639.430036] ? filp_open+0x70/0x70 [ 639.430043] ? fput+0xd4/0x150 [ 639.430052] ? SyS_pwrite64+0xca/0x140 [ 639.430064] SyS_open+0x2d/0x40 [ 639.430070] ? do_sys_open+0x430/0x430 [ 639.430079] do_syscall_64+0x1e8/0x640 [ 639.430087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.439288] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 639.439295] RIP: 0033:0x413711 [ 639.439300] RSP: 002b:00007f3f2243da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 639.439310] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000413711 [ 639.439314] RDX: 00007f3f2243db0a RSI: 0000000000000002 RDI: 00007f3f2243db00 [ 639.439320] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 639.559586] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 639.566832] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 639.599977] BTRFS error (device loop1): superblock checksum mismatch [ 639.660712] BTRFS error (device loop1): open_ctree failed [ 639.676570] BTRFS error (device loop5): superblock checksum mismatch 23:26:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', 'btrfs\x00'}, &(0x7f0000000280)=""/84, 0x54) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)=""/130, &(0x7f0000000180)=0x82) socket$inet_sctp(0x2, 0x1, 0x84) 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='nodev#-\x00', 0xfffffffffffffffd) r1 = add_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000340)="5f16db0d4696d485ea139de5ab213ebe9b4ce5aa355af4838cc2267aa8c44013c729c671c5e5dc1ee9270ca115662d7929ffdcd6c4f0ded14c0fb98cb7c0d2193dd7ac6c77e4ccb05478", 0x4a, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000002c0)={r0, r1, r2}, &(0x7f00000003c0)=""/131, 0x83, &(0x7f0000000540)={&(0x7f0000000480)={'sha3-256\x00'}, &(0x7f00000004c0)="1d465528a121966dfa1f6d62a76b66604dc56de71216d4cb608847fb314267c78f14fccbaa0811256bb86177a8bb862c3edd30671f5e7a558dc056ec984a9fed2f1bb41b5f6083e9b2525c9d5841034c46b180614fdb0cb25c3663670ef853695c19eb56662fcec879efafe39ef89c9324", 0x71}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:33 executing program 2 (fault-call:3 fault-nth:12): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 23:26:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6a30a2abd380aeb, &(0x7f00000000c0)=[{&(0x7f0000000100)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000006542485266535f4d", 0x35, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='keyring-\x00', &(0x7f0000000280)='btrfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='/dev/input/mouse#\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='.wlan0#\'-vboxnet1\x00', &(0x7f00000003c0)='cgroupeth1{cgroupnodevselinux\x00', &(0x7f0000000400)='/dev/input/mouse#\x00', &(0x7f0000000440)='btrfs\x00']) [ 639.770174] BTRFS error (device loop5): open_ctree failed [ 639.777637] BTRFS error (device loop1): superblock checksum mismatch 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x1, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x8000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x408040) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000002c0)={0x7f, 0x3, 0x9dd0, 0x8}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x121000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0xffffffff, 0x1, 0x6, 0x1, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x101, 0x8, 0x1f, 0x7f, 0x10001}, &(0x7f0000000200)=0x14) r3 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000000)={0x3, 0x8000003, 0x1, [0x5]}) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0xc79, @dev={0xfe, 0x80, [], 0x2a}, 0x8}, @in6={0xa, 0x4e24, 0x2, @mcast1, 0x400}], 0x38) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000100)}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 639.833367] BTRFS error (device loop1): open_ctree failed [ 639.861621] FAULT_INJECTION: forcing a failure. [ 639.861621] name failslab, interval 1, probability 0, space 0, times 0 [ 639.881347] CPU: 0 PID: 17014 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 639.888442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.888447] Call Trace: [ 639.888463] dump_stack+0x138/0x19c [ 639.888480] should_fail.cold+0x10f/0x159 [ 639.888494] should_failslab+0xdb/0x130 [ 639.900385] kmem_cache_alloc_trace+0x2e9/0x790 [ 639.900395] ? __lockdep_init_map+0x10c/0x570 [ 639.900407] ? loop_get_status64+0x120/0x120 [ 639.900416] __kthread_create_on_node+0xe3/0x3e0 [ 639.900425] ? kthread_park+0x140/0x140 [ 639.900434] ? __fget+0x210/0x370 [ 639.900449] ? loop_get_status64+0x120/0x120 [ 639.900457] kthread_create_on_node+0xa8/0xd0 [ 639.900464] ? __kthread_create_on_node+0x3e0/0x3e0 [ 639.900473] ? __lockdep_init_map+0x10c/0x570 [ 639.900485] lo_ioctl+0xcf7/0x1ce0 [ 639.900494] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 639.900504] ? loop_probe+0x160/0x160 [ 639.908227] blkdev_ioctl+0x96b/0x1860 [ 639.930409] ? blkpg_ioctl+0x980/0x980 [ 639.930427] ? __might_sleep+0x93/0xb0 [ 639.942181] ? __fget+0x210/0x370 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x14, 0x50110, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000200)=0xfffffffffffffff8, 0x4) r1 = accept4$nfc_llcp(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x60, 0x800) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x2}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 639.942195] block_ioctl+0xde/0x120 [ 639.942203] ? blkdev_fallocate+0x3b0/0x3b0 [ 639.942212] do_vfs_ioctl+0x7ae/0x1060 [ 639.942224] ? selinux_file_mprotect+0x5d0/0x5d0 [ 639.942232] ? lock_downgrade+0x6e0/0x6e0 [ 639.942243] ? ioctl_preallocate+0x1c0/0x1c0 [ 639.942252] ? __fget+0x237/0x370 [ 639.951715] ? security_file_ioctl+0x89/0xb0 [ 639.951726] SyS_ioctl+0x8f/0xc0 [ 639.951734] ? do_vfs_ioctl+0x1060/0x1060 [ 639.951745] do_syscall_64+0x1e8/0x640 [ 639.951752] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) [ 639.951766] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 639.951773] RIP: 0033:0x459697 [ 639.951780] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 [ 639.969676] QAT: Invalid ioctl [ 639.972385] ORIG_RAX: 0000000000000010 [ 639.972391] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 639.972395] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 639.972400] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 639.972404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 23:26:33 executing program 2 (fault-call:3 fault-nth:13): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) [ 639.972409] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 640.102102] BTRFS error (device loop5): superblock checksum mismatch [ 640.160631] BTRFS error (device loop5): open_ctree failed [ 640.168364] BTRFS error (device loop5): superblock checksum mismatch [ 640.172342] FAULT_INJECTION: forcing a failure. [ 640.172342] name failslab, interval 1, probability 0, space 0, times 0 23:26:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) tkill(r2, 0xa) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200000, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000140)={{0x4, @name="56c10abe323e63750a2dbc65dc4b3c61cd0364d4f974c6f8a5815035244007fd"}, 0x8, 0x9, 0xa789}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 640.212387] CPU: 0 PID: 17050 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 640.219488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.219492] Call Trace: [ 640.219508] dump_stack+0x138/0x19c [ 640.219525] should_fail.cold+0x10f/0x159 [ 640.219539] should_failslab+0xdb/0x130 [ 640.219550] kmem_cache_alloc+0x2d7/0x780 [ 640.231439] ? trace_hardirqs_on+0x10/0x10 [ 640.231450] ? save_trace+0x290/0x290 [ 640.231464] __kernfs_new_node+0x70/0x420 [ 640.231476] kernfs_new_node+0x80/0xf0 [ 640.231487] kernfs_create_dir_ns+0x41/0x140 [ 640.231498] internal_create_group+0xea/0x7b0 [ 640.231513] sysfs_create_group+0x20/0x30 [ 640.231524] lo_ioctl+0x1176/0x1ce0 [ 640.279772] ? loop_probe+0x160/0x160 [ 640.283547] blkdev_ioctl+0x96b/0x1860 [ 640.287407] ? blkpg_ioctl+0x980/0x980 [ 640.291273] ? __might_sleep+0x93/0xb0 [ 640.295132] ? __fget+0x210/0x370 [ 640.298556] block_ioctl+0xde/0x120 [ 640.302154] ? blkdev_fallocate+0x3b0/0x3b0 [ 640.306448] do_vfs_ioctl+0x7ae/0x1060 [ 640.310308] ? selinux_file_mprotect+0x5d0/0x5d0 [ 640.315034] ? lock_downgrade+0x6e0/0x6e0 [ 640.319152] ? ioctl_preallocate+0x1c0/0x1c0 [ 640.323534] ? __fget+0x237/0x370 [ 640.326962] ? security_file_ioctl+0x89/0xb0 [ 640.331341] SyS_ioctl+0x8f/0xc0 [ 640.334678] ? do_vfs_ioctl+0x1060/0x1060 [ 640.338799] do_syscall_64+0x1e8/0x640 [ 640.342657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.347476] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 640.352635] RIP: 0033:0x459697 [ 640.355795] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:26:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfffffffffffffeb0, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x800) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x3ff, 0xfffffffffffffff7, [0x80000001, 0x800, 0xfffffffe, 0x0, 0x3], 0x1000}) 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 640.363475] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 640.370717] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 640.377958] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 640.385202] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 640.392440] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x1000}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e23, 0x9, @remote, 0x8001}}, 0x1, 0x7, 0x3, 0x9, 0xff}, &(0x7f0000000280)=0x98) 23:26:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)=0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xd580f71e5c6e369a, 0x0) perf_event_open(0x0, r1, 0xa, r2, 0xb) open_by_handle_at(r2, &(0x7f0000000180)={0xd2, 0x4, "8da6c7202471b77613ffd849dcb9a0efc4c7e4e303c435d1fb85a5814ac1a79eb2cc080d274504bd1c76a0e6607594d01560ff9d9e6a163c3d712e16fe42b5594cd59154f27a42c288939d4277c0a553f70889d872d08dc870cf6d9fcc7bb0b1dbc4fcab4b4f0bd4bee68655223bc0bc99fda36bd3f9c1823d14d34205a41abc68b3d3361c93f327651ea578f2a5657044e95038310d91dea045d8e5056296bec582084824b22366b3054d759d2f60dfb234a02b6b4782d110227b9b911b58d7256e40ab14e49f56092d"}, 0x200040) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000008c0)="8da40000000000000000000000000000fff6f2a2299748eb951e1b00920efd9a0000010000000000000000000000005f42485266535f4d", 0xffffffdc, 0x400}], 0x0, 0x0) [ 640.523916] BTRFS error (device loop5): open_ctree failed [ 640.540884] BTRFS error (device loop5): superblock checksum mismatch [ 640.586063] QAT: Invalid ioctl 23:26:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 23:26:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x1, 0x4) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x5, 0x400, 0x3}) 23:26:33 executing program 2 (fault-call:3 fault-nth:14): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 640.610536] BTRFS error (device loop5): open_ctree failed [ 640.678141] BTRFS error (device loop5): superblock checksum mismatch [ 640.695571] FAULT_INJECTION: forcing a failure. [ 640.695571] name failslab, interval 1, probability 0, space 0, times 0 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000140)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) connect$llc(r2, &(0x7f0000000200)={0x1a, 0x33a, 0x3, 0x8000, 0x2f8, 0x80e}, 0x10) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = dup2(r0, r0) r5 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x9, 0x20200) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000700)) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000340)=[{0x25, 0x0, [0x97, 0x4, 0x5, 0x26, 0x6, 0x9, 0xee7, 0x400, 0x100000000, 0x3e, 0x4, 0x3f, 0x7, 0x8, 0x0, 0x100]}, {0x26, 0x0, [0xc68f, 0x2, 0x3, 0x0, 0xca, 0xe260a95, 0x80, 0x1, 0xffffffffffffffc1, 0x8, 0x9, 0x1f, 0x8f3, 0x6, 0xffffffff, 0x7ff]}, {0x10, 0x0, [0x6, 0x7, 0x8, 0x3ff, 0x7, 0xafd, 0x3f, 0x2, 0x4, 0x5, 0x4, 0x80000001, 0xfffffffffffffffd, 0x29, 0x7fff, 0x8]}, {0x21, 0x0, [0x4, 0x7ff, 0x800, 0x10001, 0x8000, 0x7ff, 0x4, 0x7, 0x10000, 0x6, 0x8001, 0x5, 0x0, 0x100000000, 0x1, 0xf40]}, {0x4, 0x0, [0x0, 0x7, 0xfffffffffffffc00, 0x5, 0x33, 0x4, 0x4, 0x7, 0x9, 0x4, 0x80, 0x8, 0x4, 0x7fffffff, 0xffffffff7fffffff, 0x8]}, {0x5, 0x0, [0xfffffffffffffe01, 0x0, 0x1, 0xfffffffffffffffc, 0x7, 0x6, 0x7, 0x1, 0x1, 0x1b97600000000000, 0x400, 0x3, 0x4, 0x6, 0x0, 0xfffffffffffffeff]}, {0x10, 0x0, [0x6, 0x3ff, 0x100, 0x5d, 0x0, 0x6, 0xfffffffffffffb8f, 0x6, 0x9, 0x1, 0x6, 0x9, 0x8001, 0x9, 0x1, 0x80000001]}, {0x1a, 0x0, [0xfffffffffffff001, 0x7, 0xc80, 0x5, 0x1000, 0x3619, 0x80000001, 0x6d, 0x0, 0x7, 0x6, 0x100000001, 0x9, 0x1, 0x800, 0x9]}, {0x20, 0x0, [0x200, 0xda, 0x8001, 0x2b, 0x661a, 0x0, 0x5, 0x1, 0x800, 0x7, 0x2, 0xfff, 0x10000, 0x16, 0x5, 0x3ff]}, {0x1, 0x0, [0x3, 0x81, 0x0, 0x3, 0xff, 0x8, 0xffff, 0x401, 0x1f, 0x4, 0x8, 0x80, 0x1ff, 0x3ff, 0x0, 0x5]}], r6, 0x1, 0x1, 0x2d0}}, 0x20) setsockopt$TIPC_MCAST_REPLICAST(r4, 0x10f, 0x86) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) 23:26:34 executing program 3: link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 640.732094] CPU: 0 PID: 17102 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 640.739197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.748628] Call Trace: [ 640.751208] dump_stack+0x138/0x19c [ 640.754835] should_fail.cold+0x10f/0x159 [ 640.758976] should_failslab+0xdb/0x130 [ 640.762944] kmem_cache_alloc+0x2d7/0x780 [ 640.767084] ? __mutex_unlock_slowpath+0x71/0x800 [ 640.771915] ? __lock_is_held+0xb6/0x140 [ 640.775971] ? mlx4_ib_fmr_alloc+0x1d0/0x440 [ 640.780386] __kernfs_new_node+0x70/0x420 [ 640.784532] kernfs_new_node+0x80/0xf0 [ 640.788413] __kernfs_create_file+0x46/0x323 [ 640.792806] sysfs_add_file_mode_ns+0x1e4/0x450 [ 640.797448] internal_create_group+0x232/0x7b0 [ 640.802004] sysfs_create_group+0x20/0x30 [ 640.806122] lo_ioctl+0x1176/0x1ce0 [ 640.809723] ? loop_probe+0x160/0x160 [ 640.813510] blkdev_ioctl+0x96b/0x1860 [ 640.817368] ? blkpg_ioctl+0x980/0x980 [ 640.821232] ? __might_sleep+0x93/0xb0 [ 640.825091] ? __fget+0x210/0x370 [ 640.828514] block_ioctl+0xde/0x120 [ 640.832110] ? blkdev_fallocate+0x3b0/0x3b0 [ 640.836403] do_vfs_ioctl+0x7ae/0x1060 [ 640.840262] ? selinux_file_mprotect+0x5d0/0x5d0 [ 640.844986] ? lock_downgrade+0x6e0/0x6e0 [ 640.849102] ? ioctl_preallocate+0x1c0/0x1c0 [ 640.853484] ? __fget+0x237/0x370 [ 640.856911] ? security_file_ioctl+0x89/0xb0 [ 640.861290] SyS_ioctl+0x8f/0xc0 [ 640.864627] ? do_vfs_ioctl+0x1060/0x1060 [ 640.868746] do_syscall_64+0x1e8/0x640 [ 640.872606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.877421] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 640.882580] RIP: 0033:0x459697 [ 640.885741] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 640.893416] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 640.900663] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 640.907906] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 640.915151] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 640.922390] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_sctp(0xa, 0x1, 0x84) close(r0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x87f227ecdbec2a18, 0x0) 23:26:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) [ 640.950223] BTRFS error (device loop5): open_ctree failed [ 640.962949] BTRFS error (device loop1): superblock checksum mismatch 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x80000000, 0x4000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000400), &(0x7f0000000440)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x8, 0x240100) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000280)=0x84) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000c00)={0xc5f, 0x1, 0x1, r3}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e24, 0x3, @rand_addr="ab9ee4ea138b2cd57f1db1152851d03a", 0x7}}}, 0x84) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) io_setup(0x81, &(0x7f00000004c0)=0x0) io_submit(r5, 0x6, &(0x7f0000000bc0)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x9d5, r0, &(0x7f0000000500)="48943fc8c4ed55938c1681b6d6a3f09d759bd9e949bd0a9175080688bfdbd351fc2d57ebc9ed1122eebede79a29b62b26b821878d7ece2c40621e70ceb852403d3c37347b0b0f50cd8ac4ab22ab292c68970f1c769ba74922179b122ff4d7b46e8a24d86070a352d4ad46df0129b774eb5d98477702d710382bd8bfe000de01ee4ee4f1c855afd0c4a8a", 0x8a, 0x1f, 0x0, 0x2, r3}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x10000, r3, &(0x7f0000000600)="ced57c4cce150c5bb423e3afe719a476e0ae9021fd1b59d4428d69bedf3ef6342ee089758555c83e8a4a774e05681458274d9de7e49b4a80a2c1fd358fbff220b5f19160de9e1c88493efae5c6c274371a47ed4fdec44145f862f15b7b6b1adf6a0d4251e7c03cc9953bcb5a10e4393bc1035d841e71dd9a92e7c2509af5d4620528010353eac3f7ee75c928894108b11a7d735b45f0bc73a358097e5037676e00ecfd0fadb9e5c8029f19400cf6bbf50a95ea8f371042dcf0bbd87344dc88cf37bd0bce33a22d3078e55bc3be444cea64bef3276b2354d5ba516cc99113", 0xde, 0x0, 0x0, 0x2, r2}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x4, r0, &(0x7f0000000740)="ddfe7545706c60491aeae1d446b27d2bfb7604f2b1cc907ba0d0cc63d26fcae9f9496cef16fa2f5ae09b574985913282ab5d111761e481e3e6d56a31c9de9143e682a809b03b0c9ed694903a2e6ab64c2a0a0edda335dd42619a2afaa61a6ebfdb97f7fd733ac7af0ae309eae49937690ddaccf1818ee6f0202256eafebe8e86d87139e223d2c440c177076429b3bd97627676235d2dbe201e273231d98d196f63ee632994", 0xa5, 0x5, 0x0, 0x1}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x6, 0xd0, r3, &(0x7f0000000940)="16afe6586aa56fd3d8f51ad351f9c160321fafdacc6415f69721b34f1e37c4d46559a6fe55e6d76bff570518dcdc3878b41737e23b472bbc4bd9ba81f000ae6af44ab0b1613c9ba59d4596767ba4dfc8dd4bf18c590faed022f417019187eb1b0e117b4166a514f310fd3e66552c56e7f9574c0efae87f7765f55555cf1b3cc35d3ee2b08c3b0bad5def595d1e867156d9d4dbf53aa8acdc2ee856cce5ca82153a94edac79b2291176a785aec9fd1da6f43c6ede21cae8ac263cde2c7202f6484cd1011f61185c7576ea95744935dc", 0xcf, 0x5, 0x0, 0x0, r1}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0x8, r3, &(0x7f0000000a40)="ff3626629b44db81a2099b050b7c05e6361b68b0c0cefefae513861165a5b4207331b350eba85cc82a8d44b68fadba14495c550782b402ce6868e15a19a2c5e8604d166e0ac17cc9411d5cbbcba970e55b89b01c8637ce3857d87631a1bd200941bb60af3fba464bcbd3b6df218631531723a5651b284964dee1734f258fe7ed4aa9605afbdf0059", 0x88, 0x8001, 0x0, 0x2, r3}, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000b00)="848bc4646fcc1f45485684c296be022f094a11c6f8192d45b93cf552faded979f579b3f66713e453690d7cab83046fc26f5ff4ae53596332e6a144fe32e0a7b373068d1c5f344a36cc", 0x49, 0x7, 0x0, 0x1, r3}]) r6 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000b63000/0x4000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000140)=""/124) 23:26:34 executing program 2 (fault-call:3 fault-nth:15): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 641.020392] BTRFS error (device loop1): open_ctree failed [ 641.058123] BTRFS error (device loop3): superblock checksum mismatch 23:26:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x6, 0x101080) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x100) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) [ 641.131691] BTRFS error (device loop3): open_ctree failed [ 641.139831] BTRFS error (device loop3): superblock checksum mismatch [ 641.149059] FAULT_INJECTION: forcing a failure. [ 641.149059] name failslab, interval 1, probability 0, space 0, times 0 [ 641.178335] CPU: 0 PID: 17137 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 641.185431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.194755] Call Trace: [ 641.197327] dump_stack+0x138/0x19c [ 641.200950] should_fail.cold+0x10f/0x159 [ 641.205094] should_failslab+0xdb/0x130 [ 641.209056] kmem_cache_alloc+0x2d7/0x780 [ 641.213176] ? wait_for_completion+0x420/0x420 [ 641.217739] __kernfs_new_node+0x70/0x420 [ 641.221867] kernfs_new_node+0x80/0xf0 [ 641.225732] __kernfs_create_file+0x46/0x323 [ 641.230112] sysfs_add_file_mode_ns+0x1e4/0x450 [ 641.234752] internal_create_group+0x232/0x7b0 [ 641.239307] sysfs_create_group+0x20/0x30 [ 641.243427] lo_ioctl+0x1176/0x1ce0 [ 641.247023] ? loop_probe+0x160/0x160 [ 641.250792] blkdev_ioctl+0x96b/0x1860 [ 641.254647] ? blkpg_ioctl+0x980/0x980 [ 641.258506] ? __might_sleep+0x93/0xb0 [ 641.262369] ? __fget+0x210/0x370 [ 641.265791] block_ioctl+0xde/0x120 [ 641.269389] ? blkdev_fallocate+0x3b0/0x3b0 [ 641.273685] do_vfs_ioctl+0x7ae/0x1060 [ 641.277545] ? selinux_file_mprotect+0x5d0/0x5d0 [ 641.282270] ? lock_downgrade+0x6e0/0x6e0 [ 641.286385] ? ioctl_preallocate+0x1c0/0x1c0 [ 641.290765] ? __fget+0x237/0x370 [ 641.294191] ? security_file_ioctl+0x89/0xb0 [ 641.298567] SyS_ioctl+0x8f/0xc0 [ 641.301906] ? do_vfs_ioctl+0x1060/0x1060 [ 641.306026] do_syscall_64+0x1e8/0x640 [ 641.309881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 641.314697] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 641.319854] RIP: 0033:0x459697 [ 641.323014] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x40000000000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioprio_get$pid(0x3, r0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 641.330690] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 641.337933] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 641.345173] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 641.352413] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 641.359651] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 641.370385] BTRFS error (device loop3): open_ctree failed 23:26:34 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x6, 0x6, 0x4, 0x10000, {}, {0x3, 0x3, 0x2, 0x5, 0x0, 0x80000001, "558b89a4"}, 0x6, 0x1, @offset=0xce36, 0x4}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 641.398328] BTRFS error (device loop1): superblock checksum mismatch 23:26:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 641.490179] BTRFS error (device loop1): open_ctree failed [ 641.499203] BTRFS error (device loop1): superblock checksum mismatch 23:26:34 executing program 2 (fault-call:3 fault-nth:16): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(r0, r0, 0x8454a3dac968ec8b) ioctl$RTC_WIE_OFF(r1, 0x7010) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:34 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x8040, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x800) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000200)={@default, @default, 0x2, 0x44}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x8, 0x109c00) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x1, 0x4) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)=0x8, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 641.593588] BTRFS error (device loop1): open_ctree failed [ 641.601691] BTRFS error (device loop1): superblock checksum mismatch [ 641.683432] FAULT_INJECTION: forcing a failure. [ 641.683432] name failslab, interval 1, probability 0, space 0, times 0 [ 641.701407] CPU: 0 PID: 17183 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 641.703558] BTRFS error (device loop1): open_ctree failed [ 641.708505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.723352] Call Trace: [ 641.725928] dump_stack+0x138/0x19c [ 641.725941] should_fail.cold+0x10f/0x159 [ 641.725953] should_failslab+0xdb/0x130 [ 641.733673] kmem_cache_alloc+0x2d7/0x780 [ 641.733683] ? wait_for_completion+0x420/0x420 [ 641.733699] __kernfs_new_node+0x70/0x420 [ 641.733711] kernfs_new_node+0x80/0xf0 [ 641.733722] __kernfs_create_file+0x46/0x323 [ 641.733732] sysfs_add_file_mode_ns+0x1e4/0x450 [ 641.733742] internal_create_group+0x232/0x7b0 [ 641.741818] sysfs_create_group+0x20/0x30 [ 641.741829] lo_ioctl+0x1176/0x1ce0 [ 641.741841] ? loop_probe+0x160/0x160 [ 641.741851] blkdev_ioctl+0x96b/0x1860 [ 641.741859] ? blkpg_ioctl+0x980/0x980 [ 641.787140] ? __might_sleep+0x93/0xb0 [ 641.790997] ? __fget+0x210/0x370 [ 641.794425] block_ioctl+0xde/0x120 [ 641.798023] ? blkdev_fallocate+0x3b0/0x3b0 [ 641.802317] do_vfs_ioctl+0x7ae/0x1060 [ 641.806179] ? selinux_file_mprotect+0x5d0/0x5d0 [ 641.810907] ? lock_downgrade+0x6e0/0x6e0 [ 641.815025] ? ioctl_preallocate+0x1c0/0x1c0 [ 641.819412] ? __fget+0x237/0x370 [ 641.822838] ? security_file_ioctl+0x89/0xb0 [ 641.827221] SyS_ioctl+0x8f/0xc0 [ 641.830556] ? do_vfs_ioctl+0x1060/0x1060 [ 641.834675] do_syscall_64+0x1e8/0x640 [ 641.838534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 641.843351] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 641.849013] RIP: 0033:0x459697 [ 641.852177] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 641.859856] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 641.867099] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 641.874340] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 641.881581] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 641.888821] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 641.916232] BTRFS error (device loop1): superblock checksum mismatch 23:26:35 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000140)={0x7ff, 0x8}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 23:26:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup2(r0, r0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 641.991226] BTRFS error (device loop1): open_ctree failed [ 642.000524] BTRFS error (device loop1): superblock checksum mismatch [ 642.050178] BTRFS error (device loop1): open_ctree failed [ 642.057320] BTRFS error (device loop1): superblock checksum mismatch 23:26:35 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl(r0, 0xffff, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:35 executing program 2 (fault-call:3 fault-nth:17): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 23:26:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x12, 0x5}], 0xf43, 0x0) 23:26:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20, 0x6, &(0x7f0000000600)=[{&(0x7f0000000140)="b3fbaaefa83fafa562efa2e0a872c6bbc9c1e0e6fce08064e31215ec6f9bc3971a34a4a2e30840f8e7b044dbf8108719b40fa2a39dce8360880973409f21ed29d8dbb7740eb504d559fcd60cffe30aba657e17458307d62d75ef8bf09ec29ae6977f707b01472acf5d2e987b57df0ea7b3de2369d9ce356a2ada175cb7ca363836c7b763fd1c19dfacb7017cdd4caa5f997c83291095d5e6d2a668a82b7b276622807243198190ad8c61c8ea1e88ce04763dbade2c7196e04383723c8db55312aa5173ce9f31b03e51145b99b0f755417b8822b648528b25597df60d3469faebc81acfb3fc8c", 0xe6, 0x81}, {&(0x7f0000000240)="c0ae9fc1c3720639adf63203e59c88a65a91d7f26b80b20aacb12e5a7259483eb3572f2c8272c473e9cb4a407fbc4060743bdeaf72cc6320605092b7b25358c43bd0f4443838dc3686a4078e589de9621b77073f249848b4e5b9863b57de846f4b7baa16890e98b1f3ede4dee3675fab74f62b14ee9105179c1a65b10d16835c963dcd28db7de4b230e97c1eb6bf7805f62d3d2a287f35b510724d295656aee2eed214d77976ee583f55d08e83", 0xad, 0x6000000000000003}, {&(0x7f0000000300)="e0eeeaafa4e73e45f6a341f3751d53aec524f8c727963ab64459939a47adf23d39971ea29761e314ef09be6d9b78a55f4f8a41", 0x33, 0x8001}, {&(0x7f0000000340)="94da707853f616f4e4aac3eec5fea3e76367db06f25c0cee1409337f39ff2e6f8bab99c8802b368be6f155bff4050a3fe6eb437f5faf9fff4a20dda8177fe1e4d2e9ebd8fe4d17c092a6b5df4ad1a5654f725a450a84235d87fce34eef3f9deb3ba2744d9d53742dc293f7b4404e97135b411a5e862c949f32061851d16a22462599bec9be3e13e28fc487562d1b7536d71110ce1269fbae2f5220a9da1a77cbe26f0ce3bddd9ae12e57", 0xaa, 0x7}, {&(0x7f0000000400)="e0c8f602963d1ae68ec87843d7bbca8988e52e7ac3b23c2cdd8e66fdf41051100502f7090d63da3a958500dfdc3ac064f11e9ad895822760a2ed19c5eb0c72bdb086c173a3c1f9baf418ae4a273f8524ff76c1792e36f9684fe083af2c10bc2dbeea054e3ac9bd5c8cd63e162c202359a7805c97a0e86eb7fe27bb4e3d756c296ad70b5f616eb9fd227e0a1307b05cb2b58a752f9e01b45ae4d0d4fd58fa6a0688313e6323a695b6a0db1ed93599bf35026ee671eca8635d06da5ffcb0ed3cacfe147b874b4aa630a830805a9ae06f06", 0xd0, 0x1}, {&(0x7f0000000500)="faa460608f85c25272a80b833ca7095d220f80c7b6a15753e649dd74ef72b98d66e2a6796d15eb6b101aa8e9194381a17086f5ff2a6209c145f47911aae74fc4553d6c4ce78e5365e013977edf6db1971b1044ee1271eb3b66ff97070fa627c98c48ac085d751a08e93f6e034d097ffe451761661fbb18499de52fbc7684160f22104ac69039fa545c9d75641ab8840687eb411b2e8324d03a1df2caf339e96ea49bd1cce257209641ad5546818f680f04f1b56b14e2d8bc1a1ca711a37d04061be136", 0xc3, 0x8}], 0x800, &(0x7f00000006c0)={[{@space_cache_v2='space_cache=v2'}, {@device={'device', 0x3d, './file0'}}, {@noenospc_debug='noenospc_debug'}, {@noinode_cache='noinode_cache'}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x66, 0x67, 0x39, 0x73, 0x36, 0x62, 0x38], 0x2d, [0x36, 0x30, 0x37, 0x35], 0x2d, [0x61, 0x64, 0x7f, 0x65], 0x2d, [0x37, 0x34, 0x38], 0x2d, [0x5b5f3ef8b734d99e, 0x61, 0x35, 0x30, 0x7f, 0x34, 0x35, 0x35]}}}, {@context={'context', 0x3d, 'staff_u'}}]}) [ 642.150222] BTRFS error (device loop1): open_ctree failed [ 642.158010] BTRFS error (device loop1): superblock checksum mismatch [ 642.205857] FAULT_INJECTION: forcing a failure. [ 642.205857] name failslab, interval 1, probability 0, space 0, times 0 [ 642.217588] BTRFS error (device loop1): open_ctree failed 23:26:35 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e22, 0x9, @mcast1, 0x9}, {0xa, 0x4e20, 0x714f544, @mcast2, 0x400}, 0x0, [0xab09, 0x4, 0x800, 0x7fff, 0xfffffffffffffffa, 0x5, 0x1, 0xa13]}, 0x5c) [ 642.253924] CPU: 1 PID: 17234 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 642.261025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.270364] Call Trace: [ 642.272945] dump_stack+0x138/0x19c [ 642.276564] should_fail.cold+0x10f/0x159 [ 642.280705] should_failslab+0xdb/0x130 [ 642.284671] kmem_cache_alloc+0x2d7/0x780 [ 642.288806] ? wait_for_completion+0x420/0x420 [ 642.293383] __kernfs_new_node+0x70/0x420 [ 642.297531] kernfs_new_node+0x80/0xf0 23:26:35 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x3, 0x101000) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1549) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000280)={0x4, "da16520831d4306eede688f67c373a45b4e8160ef6362dd8dd97902a75671c9c", 0x1, 0x100, 0x2, 0x7, 0x4, 0x1, 0xfffffffffffffffc, 0xc26}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000500)={'IDLETIMER\x00'}, &(0x7f0000000540)=0x1e) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000004c0)={'syzkaller1\x00', r2}) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x3) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x0, 0x70bd2c, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000340)=0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 642.301412] __kernfs_create_file+0x46/0x323 [ 642.305810] sysfs_add_file_mode_ns+0x1e4/0x450 [ 642.310471] internal_create_group+0x232/0x7b0 [ 642.315049] sysfs_create_group+0x20/0x30 [ 642.319185] lo_ioctl+0x1176/0x1ce0 [ 642.322802] ? loop_probe+0x160/0x160 [ 642.326593] blkdev_ioctl+0x96b/0x1860 [ 642.330467] ? blkpg_ioctl+0x980/0x980 [ 642.334348] ? __might_sleep+0x93/0xb0 [ 642.338227] ? __fget+0x210/0x370 [ 642.341672] block_ioctl+0xde/0x120 [ 642.345286] ? blkdev_fallocate+0x3b0/0x3b0 [ 642.349596] do_vfs_ioctl+0x7ae/0x1060 23:26:35 executing program 0: accept$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @rose}, [@remote, @rose, @netrom, @remote, @remote, @bcast, @netrom, @rose]}, &(0x7f00000000c0)=0x48) r0 = socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x3) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x2b, 0xafe0e62cafc580b2) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000280), &(0x7f00000002c0)=0x4) io_setup(0x1, &(0x7f00000001c0)=0x0) io_destroy(r2) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) [ 642.353474] ? selinux_file_mprotect+0x5d0/0x5d0 [ 642.358218] ? lock_downgrade+0x6e0/0x6e0 [ 642.362358] ? ioctl_preallocate+0x1c0/0x1c0 [ 642.366759] ? __fget+0x237/0x370 [ 642.370207] ? security_file_ioctl+0x89/0xb0 [ 642.374601] SyS_ioctl+0x8f/0xc0 [ 642.374610] ? do_vfs_ioctl+0x1060/0x1060 [ 642.374622] do_syscall_64+0x1e8/0x640 [ 642.374630] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 642.374644] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 642.374650] RIP: 0033:0x459697 [ 642.374657] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 [ 642.382117] ORIG_RAX: 0000000000000010 [ 642.382122] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 642.382127] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 642.382132] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 642.382136] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 642.382141] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 23:26:35 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000980)='/dev/vcs#\x00', 0x80200000, 0x52200) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000a80)={{0x4, 0x5, 0xfff, 0x7, 'syz0\x00', 0x9}, 0x0, [0x8001, 0x0, 0x80000001, 0x5, 0x1f, 0x8001, 0x8000, 0xff, 0x0, 0xfffffffffffffffa, 0x6, 0x3f, 0x0, 0x3ff, 0x2, 0x2, 0x7, 0x81, 0x3, 0x9bf, 0x7, 0xf6f8, 0x7fffffff, 0x7fffffff, 0x8, 0x0, 0xb3c3, 0x3, 0x48, 0x4, 0x2, 0x4, 0x666, 0x7, 0x5, 0x101, 0x4, 0xff, 0xfb, 0x10001, 0x4c0, 0x401, 0x3, 0x4, 0x3, 0x2, 0x8, 0x8, 0xffffffffffffffff, 0x9e2, 0x6, 0x9, 0x0, 0xfff, 0x40, 0x5, 0x8, 0x80000001, 0x10001, 0x1f, 0x9, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0x1, 0x5, 0x7f, 0x7, 0xfffffffffffffffa, 0x2, 0x1, 0x3, 0x4a7165c9, 0x5, 0x7f, 0x1f, 0x20080, 0x3ff, 0x7, 0x0, 0x3, 0x100000001, 0x7f, 0x1, 0x3, 0x8, 0xc0, 0xff, 0x8000, 0x8, 0x3ff, 0x7, 0x5, 0x7fffffff, 0x8, 0xe0df, 0x9, 0x9, 0x2, 0x7fff, 0x9b, 0x4, 0x1, 0x9, 0x6, 0x1, 0x7ff, 0x6, 0x6, 0x8, 0x3a32, 0x9, 0x3, 0x7fffffff, 0x9, 0x6a69, 0x7, 0x7, 0x6, 0x6, 0x6, 0x4, 0x5, 0x400, 0x84, 0x101], {0x77359400}}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x141040) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000880)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/mixer\x00', 0x4000, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000a00)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) name_to_handle_at(r3, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000f80)={0x49, 0xb2, "72ca6986bf02f2fa108573ecc9eec193883d68473732669e64c373f99902f07868b04316898453c75bea5906314bc3fca3bceaacf05fe98b160bb4aa71fdc78268"}, &(0x7f0000001000), 0x400) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000940)=0x9) sendmmsg$inet6(r5, &(0x7f0000000800)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x7fffffff, @local, 0x10000}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000140)="474e39a5accd055a0a87382029b4b30123cb3168ebe9403116f75493b608dafb3d7925a627b1dd47e46898b8910f4d306454dd7c1a245abe93455a69ed74659a0436aaf24aea359cbd00090557215cc8572957357d669753e0f0d19d56b94b0fcfd7594691b376a375c39fa104cd768bdbd31575b6d4192ed9b00bd5cfac2b61962baa7d833981fc66293c344a8588ce671d028d9fe654093b5cb95ff4080df51548068b73da3100f51b19664537cbd2bf7dd784f131ffcd68ca0d1e69de4cb3b7305b4afe559643fa4f239533ca08562437b5ddcb827d5b705cc00c97a4ad3b80b84af092f36c57ab2e26161170b95eac658c83bb968f6e0beba83fe1fe", 0xfe}, {&(0x7f0000000240)="baf6b830569411d12a08aa746196588ce25b95779846943f93b238ac43c9f24b4c5586ae633cf54bfe7867", 0x2b}], 0x2, &(0x7f0000000340)=[@tclass={{0x14, 0x29, 0x43, 0x8}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @hopopts_2292={{0x68, 0x29, 0x36, {0xc, 0x9, [], [@enc_lim={0x4, 0x1, 0x5}, @hao={0xc9, 0x10, @mcast2}, @ra={0x5, 0x2, 0x3}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x100000000}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x2}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x98}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x1, @empty}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000400)="9f010fc222e6ace95454c5b30327e547fc4a06ba3aab1adf529b704f5a31f95e5ede88cdfcf12df1c6d90c37ff75ecebbc5b9c0db46d74ec165d182147470f7505a0492c36e09b03", 0x48}, {&(0x7f0000000480)="bcd25a0398ae93dc131f49ef30425adcb8f8673bc36fd47d6352eac1d35e8728ad097578994c270279e7c41ba603923af630462fc7e58833c64c", 0x3a}, {&(0x7f00000004c0)="2d48ac88a4b4f63d6b9255fca1af82bc60c154faddfcc0f78adc8d6b1a06766ed0d9ce4b0f6301b162db9903ffc593e2680bd8003dffd0e5fa3d0ac96b22ab2677f149638a6fe8d4d703edb6d70e90a0ae436555190305011aaede2be2d460334a172a81f6088a5ebbf5c9e1ebb2e97863d7318f5a46c5e4c14e9c420d72b2151e89bcd070431bdb6dfabfa3087d4f995db9eec9eaae1a303132e6c4ba43b17201ae63c878b16677c5f63168bdcd8e84ab12e8dc0e58bc7d9f32ff11d0540e", 0xbf}, {&(0x7f0000000580)="e9f4f55dbdc64a1fce23dd42b66ab001dad0e87cd886d2308f433c5b7e3ab5cb2844d6fbf4daa9c4deb9bf0c4ab6dc6c7d3ef60f01ec747d28f794002a61ddcf65f97408cb20f8e4559c905952a59d7afb63b9fffef49202d54f4cc544b5866917793192da8c7a0837fec8da130e127d144f03595394a5ce32453225dba452216a8566ca828b7c89ab15b413", 0x8c}, {&(0x7f0000000640)="d563751e8028192b6b14bee1dfb90501449cf23774987c9a60431ebe950d0d77140a75ce4c", 0x25}], 0x5, &(0x7f0000000700)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x3a, 0x8, 0x1, 0x4c4d, 0x0, [@rand_addr="e280271429ba19a3b53db0631f6e01ff", @empty, @dev={0xfe, 0x80, [], 0x12}, @rand_addr="159a5fda3ae9ec841c0f90e98fbe7f28"]}}}, @rthdr={{0x38, 0x29, 0x39, {0x2f, 0x4, 0x1, 0x9cc9, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x4, 0x8, 0x3, 0xff, 0x0, [@loopback, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="09ed40bff5f0ac41847ed1c042118c7d"]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x2e4}}], 0x100}}], 0x2, 0x84) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 642.466911] BTRFS error (device loop3): superblock checksum mismatch 23:26:35 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r1, 0x7, 0x20}, &(0x7f0000000240)=0xc) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 642.560207] BTRFS error (device loop3): open_ctree failed [ 642.572501] BTRFS error (device loop1): superblock checksum mismatch 23:26:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="8012daf97f8dcc01250000004361e90badd347dcd86f0c45d92728db70093e7d79ec3ec664209b44d2a20600aa052042c185bf3c25a16004a245ce0ccc51f517cbd5c914e5f44b732ad86f862d72a3b59a52d26730fdc802d2cfe84e1673318be9dcb1bf6bedf4c21581d65c242e19093cda7274e6a99f20fe94161e", @ANYRES16=r2, @ANYBLOB="020025bd7000ffdbdf250a00000020000700080001000000000008000200000000000c000300ffffffffffffffff4c00070008000100e00000000c000400000000000000000008000200090000000c000300020000000000000008000100b40000000c00030000000000010000000c000400ffffffff00000000"], 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x804) ioctl(r0, 0x100000890e, &(0x7f00000001c0)="119e8c9aff8c59dca5055e") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x80002, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000400)=""/229) 23:26:35 executing program 2 (fault-call:3 fault-nth:18): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:35 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x200, 0x109082) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000740)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000940)={0x3f0, 0x11, 0x2, 0x1, 0x70bd2d, 0x25dfdbfd, {0xa, 0x0, 0x7}, [@generic="0468a8137a1a2f551798b5029f0d54b3442d84375ea4d5d988f890249013f8f07d3b9c29e4f92cefb466ececd430c3edd9917ec93c5f46d19f2d30a06899df1a22ddd654db84edb582189fb77b270831cf9fbe29800408d398fb3279110786dfc4d7e912c0746857c840d72ed8fb5ef2cf46a79e14a98054f0c2530ed46fae8193a2bd2db1f291d7b1bb50ef0a2de2a3deb5b9e6025971998ffc10bbc60f7da92b2dbaa53b1b5f392c501e4bd23eb2fd7855ea8082278fe7a4", @generic="50ff601905a08f1874fc081f552345c87f6047e5cdd517ed3d8761b980e3f22198479a899709ff202f6501c0d5391fa397b58c0a18", @generic="824da8924c342e79096fa09a912dc98fae3fce060125643d71b974d305599492e532bdd180288cdb297644291deed4e65b2a96eccd14ce9ce58120ffd5d30b277982b0cb5d76f2a1e33b5e4c4ec5a8086abf9c87847ae35d6992caecd2fe0612d627d3b8b12518c1fb9f84ed5fed6777267522124d166cee68c4050d5b41aaa71ee7d7dbea807b13253a40df8534d51c0ad7cbc64e12d6f5dedf15369afced4697216a0ca429671672f15e5357b03862b0f44adb9dee1d95db0fe6cd42617395b73c911f38234cae4103dc24c5c995112a35352f3d351c2a5f5a893e1f7b9a13e0076267040e0ba5e051094eb59ff80eb3d7a59a0a9e", @typed={0x8, 0x8b, @u32=0x7fffffff}, @nested={0x1f0, 0x89, [@typed={0x8, 0x74, @ipv4=@local}, @typed={0x8, 0x9, @uid=r1}, @generic="d3fa96f3c531492811d639f8f509760d1b7ea62ad1d208af4de8aaec0a5a5dc0d43dd367e9349a5963a81554474ccf557b11812d057cea506728b7cf5053c81be325c51cfb4eab0ade3bfd0161b58248f76b8fa04ad68c41d76d5043e827197104fe117b51a96bf47eb33e8ebef937147050c9cb85d6ed2543e1e33e7a232ef215d9b967b9c7e2d7d0672f9c61eeaba42b7433091f94595f0f5225a9a0f5ac6b6c68a9bbaa8a26f29044f09a0ddc1ce1dca94b0671de132354fe16d3c3f5e7046e85fb68247035961b59230c64f5ae731c1bd82d408a2d1c45ad593cbe61277c3ed6cd3f3f9ca92880", @generic="2372f11f8e41d8fb990e4869e81c7318f11415976c7096894d563444bbe7abc11fceaf1de8f42afcf486078348b56def84ff216f751201f3d3631e3cdec6f21a8ca4ec8a8a64ec1335f036bfbea11acfc81b5229e90df6b4ead6fd13dc42522d137a71b7efca81f0b2e81cc0d97a217f21618a56541fe512511634023378518ca23576df1a0c69d118d82de5d7dc1cd159aacc351a8226f09f3d88133d04dc82c268821b598d002e8acb14f943bed0f4a26e4aed4fd3921be1fb7edadb22775fea807be0408872818671d839c88622cfaf437618ce23406c717e823c8b6a700732164c973cd136efb2000e23b4b13433f33138"]}]}, 0x3f0}, 0x1, 0x0, 0x0, 0xc000}, 0xc811) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r4 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f00000004c0)={{0x250d35d0e3e9c8, @addr=0x1000}, "309d72c7504027a9b30da056907694290989de0676f984c792655ee4b9e86017", 0x1}) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="1fd83b17c989c12a823ec607e0a2aba975b10cda293e8794713d1a0801ff40f9dcad59f06ef4393f6b22a3f556ce85e460d54a30fb90a25bafd7b2a53a", 0x3d, 0x7}], 0x800000, &(0x7f00000003c0)=ANY=[@ANYBLOB='smackfsdef=/selinux/policy\x00,subj_type=proc,fowner<', @ANYRESDEC=r4, @ANYBLOB="01800000000068c6", @ANYRESDEC=r5, @ANYBLOB=',fsuuid=v\x0057c016-18b2-4d\f9-f737-877b63a9,dont_hash,\x00']) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000000480)) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0xfffffffffffffff8, 0x7, 0x9, 0x8}) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000140)={0xe47}) 23:26:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 23:26:35 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x841a}, 0x8) accept4$netrom(r0, 0x0, &(0x7f00000002c0), 0x80800) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r1}) accept$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) [ 642.640754] BTRFS error (device loop1): open_ctree failed [ 642.671458] BTRFS error (device loop3): superblock checksum mismatch 23:26:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x672dece156633dc) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000100)={0x3}) 23:26:36 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @empty}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r1, 0x8}, 0x8) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") [ 642.760197] BTRFS error (device loop3): open_ctree failed [ 642.766110] FAULT_INJECTION: forcing a failure. [ 642.766110] name failslab, interval 1, probability 0, space 0, times 0 [ 642.787656] CPU: 1 PID: 17297 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 642.794751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.804088] Call Trace: [ 642.804105] dump_stack+0x138/0x19c [ 642.804121] should_fail.cold+0x10f/0x159 [ 642.804139] should_failslab+0xdb/0x130 [ 642.810302] kmem_cache_alloc+0x2d7/0x780 [ 642.810313] ? wait_for_completion+0x420/0x420 [ 642.810329] __kernfs_new_node+0x70/0x420 [ 642.810340] kernfs_new_node+0x80/0xf0 [ 642.810351] __kernfs_create_file+0x46/0x323 [ 642.810360] sysfs_add_file_mode_ns+0x1e4/0x450 [ 642.810372] internal_create_group+0x232/0x7b0 [ 642.810386] sysfs_create_group+0x20/0x30 [ 642.810395] lo_ioctl+0x1176/0x1ce0 [ 642.810405] ? loop_probe+0x160/0x160 [ 642.822593] blkdev_ioctl+0x96b/0x1860 [ 642.822602] ? blkpg_ioctl+0x980/0x980 [ 642.822617] ? __might_sleep+0x93/0xb0 [ 642.822625] ? __fget+0x210/0x370 [ 642.822636] block_ioctl+0xde/0x120 [ 642.822644] ? blkdev_fallocate+0x3b0/0x3b0 [ 642.822653] do_vfs_ioctl+0x7ae/0x1060 [ 642.831332] ? selinux_file_mprotect+0x5d0/0x5d0 [ 642.831342] ? lock_downgrade+0x6e0/0x6e0 [ 642.831353] ? ioctl_preallocate+0x1c0/0x1c0 [ 642.831363] ? __fget+0x237/0x370 [ 642.831377] ? security_file_ioctl+0x89/0xb0 23:26:36 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x81) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 642.831386] SyS_ioctl+0x8f/0xc0 [ 642.831394] ? do_vfs_ioctl+0x1060/0x1060 [ 642.831405] do_syscall_64+0x1e8/0x640 [ 642.831413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 642.831430] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 642.848872] RIP: 0033:0x459697 [ 642.932707] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 642.940395] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 642.947636] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 642.954876] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 642.962117] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 642.969355] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 643.019618] BTRFS error (device loop3): superblock checksum mismatch 23:26:36 executing program 2 (fault-call:3 fault-nth:19): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) [ 643.067369] BTRFS error (device loop3): open_ctree failed 23:26:36 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 643.138356] FAULT_INJECTION: forcing a failure. [ 643.138356] name failslab, interval 1, probability 0, space 0, times 0 [ 643.166232] BTRFS error (device loop3): superblock checksum mismatch [ 643.168339] CPU: 0 PID: 17336 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 643.179799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.189133] Call Trace: [ 643.189147] dump_stack+0x138/0x19c [ 643.189161] should_fail.cold+0x10f/0x159 [ 643.189173] should_failslab+0xdb/0x130 [ 643.203418] kmem_cache_alloc+0x2d7/0x780 [ 643.207549] ? wait_for_completion+0x420/0x420 [ 643.212109] __kernfs_new_node+0x70/0x420 [ 643.216231] kernfs_new_node+0x80/0xf0 [ 643.220094] __kernfs_create_file+0x46/0x323 [ 643.224480] sysfs_add_file_mode_ns+0x1e4/0x450 [ 643.229127] internal_create_group+0x232/0x7b0 [ 643.233683] sysfs_create_group+0x20/0x30 [ 643.237802] lo_ioctl+0x1176/0x1ce0 [ 643.241400] ? loop_probe+0x160/0x160 [ 643.245173] blkdev_ioctl+0x96b/0x1860 [ 643.249030] ? blkpg_ioctl+0x980/0x980 [ 643.252895] ? __might_sleep+0x93/0xb0 [ 643.256753] ? __fget+0x210/0x370 [ 643.260178] block_ioctl+0xde/0x120 [ 643.263776] ? blkdev_fallocate+0x3b0/0x3b0 [ 643.268072] do_vfs_ioctl+0x7ae/0x1060 [ 643.271939] ? selinux_file_mprotect+0x5d0/0x5d0 [ 643.276663] ? lock_downgrade+0x6e0/0x6e0 [ 643.280784] ? ioctl_preallocate+0x1c0/0x1c0 [ 643.285166] ? __fget+0x237/0x370 [ 643.288596] ? security_file_ioctl+0x89/0xb0 [ 643.292976] SyS_ioctl+0x8f/0xc0 [ 643.296313] ? do_vfs_ioctl+0x1060/0x1060 [ 643.300435] do_syscall_64+0x1e8/0x640 [ 643.304295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 643.309111] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 643.314271] RIP: 0033:0x459697 [ 643.317432] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 643.325111] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 23:26:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 643.332352] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 643.339601] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 643.346844] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 643.354084] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:36 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x646, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000340)) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000940)={0x0, 0x0, 0x2080}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r4, 0x3}, &(0x7f0000000240)=0x8) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 643.593774] BTRFS error (device loop3): open_ctree failed [ 643.601149] BTRFS error (device loop5): superblock checksum mismatch 23:26:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="57748efdc52240c9b58f7b236e2fe761d2a2", 0x12, 0x66}], 0x100000, &(0x7f00000001c0)=ANY=[@ANYBLOB="636865636b5f696e742c636865636b5f696e745f7072696e745f6d61736b3d3078303030303030303030303030343038362c7373645f7370726561642c757365725f737562766f6c5f726d5f616c6c6f7765642c6e6f646973636172642c61ff07000000000000636c2c7365636c6162656c2c00"]) getsockname(r0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000300)=0x80) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r3 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x2, 0x28200) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0x0, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x40040, 0x0) socketpair(0x0, 0x805, 0x8, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x1, 0x20, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x4, 0x12b40) r9 = syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x4, 0x400041) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x84, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x4c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r0}, {0x8, 0x1, r9}, {0x8, 0x1, r0}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5bc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}]}, 0x84}}, 0x4) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r10 = accept$inet(r0, 0x0, &(0x7f0000000240)) flock(r10, 0x1) 23:26:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) sendmsg$rds(r1, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000100)=""/14, 0xe}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000000140)=""/28, 0x1c}, {&(0x7f0000000180)=""/3, 0x3}, {&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000002940)=""/4096, 0x1000}], 0x8, &(0x7f0000000640)=ANY=[@ANYBLOB="30000000000000001401000003000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/66], @ANYBLOB='B\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0400000000000000580000000000000014010000060000000500000006000000", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="0010000000000000"], @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="8fdafffff4ffffff"], @ANYBLOB="0500000000000000059d0000000000002c0000000000000005000000000000000800000000000000d29600000000000030000000000000001401000003000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00'/144], @ANYBLOB="9000000000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="110000000000000058000000000000001401000008000000930c000009000000", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB="0400000000000000"], @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="0500000000000000"], @ANYBLOB="000000000000000000800000000000000700000000000000070000000000000001000000000000000700000000000000"], 0x110, 0x8001}, 0x14) 23:26:37 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x80000, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) write$P9_RLOCK(r0, &(0x7f00000004c0)={0x8, 0x35, 0x1}, 0x8) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6247, 0x8000) write$vnet(r1, &(0x7f0000000240)={0x1, {&(0x7f0000000140)=""/18, 0x12, &(0x7f0000000180)=""/138, 0x1, 0x1}}, 0x68) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r2, &(0x7f0000000340)="97148e2b6aeaaf1abf8905244bb0d31ab6dc25c3f1c7d590c4c3462d358dc17a87d0e40f0b998939e3d9ffe3eeb2e24ca4fd9758af242085ed80ce15e09d77db0d573a33e484b3cb9acb3a3f4d99334bc7d5062ee974685e3f3dfe0244e74138fa69f731ea7c53181ed43badff124575e622145aae007c6182f2721d3ce495113616f4df91b269323598afac65873cb7904a823cd3dfbc729204454827f6541b75e3c0cc93816675f03958", 0xab, 0x8000, &(0x7f0000000400)=@nfc={0x27, 0x0, 0x0, 0x1}, 0x80) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 23:26:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da43623042a9b000400003ac0ed0000000005400001004d01000000000000000000090000000000fff6f2a2290ffd9a00000100000000000100000000000000", 0xffffffffffffffa8, 0x10000}], 0x1004f47, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xf) 23:26:37 executing program 2 (fault-call:3 fault-nth:20): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 643.695780] BTRFS error (device loop5): open_ctree failed [ 643.738682] BTRFS error (device loop1): superblock checksum mismatch [ 643.764972] FAULT_INJECTION: forcing a failure. [ 643.764972] name failslab, interval 1, probability 0, space 0, times 0 [ 643.790484] BTRFS error (device loop1): open_ctree failed [ 643.807771] CPU: 0 PID: 17389 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 643.814882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.814888] Call Trace: [ 643.814904] dump_stack+0x138/0x19c [ 643.814921] should_fail.cold+0x10f/0x159 [ 643.814934] should_failslab+0xdb/0x130 23:26:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 643.814947] kmem_cache_alloc_trace+0x2e9/0x790 [ 643.814958] ? kernfs_put+0x35e/0x490 [ 643.814965] ? sysfs_add_file_mode_ns+0x1e4/0x450 [ 643.814980] ? devm_device_remove_groups+0x50/0x50 [ 643.814992] kobject_uevent_env+0x378/0xc23 [ 643.815000] ? internal_create_group+0x49a/0x7b0 [ 643.815014] kobject_uevent+0x20/0x26 [ 643.852273] lo_ioctl+0x11e7/0x1ce0 [ 643.852286] ? loop_probe+0x160/0x160 [ 643.852297] blkdev_ioctl+0x96b/0x1860 [ 643.852306] ? blkpg_ioctl+0x980/0x980 [ 643.852322] ? __might_sleep+0x93/0xb0 [ 643.861517] ? __fget+0x210/0x370 [ 643.861530] block_ioctl+0xde/0x120 [ 643.861539] ? blkdev_fallocate+0x3b0/0x3b0 [ 643.861548] do_vfs_ioctl+0x7ae/0x1060 [ 643.861559] ? selinux_file_mprotect+0x5d0/0x5d0 [ 643.861568] ? lock_downgrade+0x6e0/0x6e0 [ 643.861576] ? ioctl_preallocate+0x1c0/0x1c0 [ 643.861585] ? __fget+0x237/0x370 [ 643.870089] ? security_file_ioctl+0x89/0xb0 [ 643.870100] SyS_ioctl+0x8f/0xc0 [ 643.870107] ? do_vfs_ioctl+0x1060/0x1060 [ 643.870120] do_syscall_64+0x1e8/0x640 23:26:37 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0xffffffffffffffff, 0x3, 0x6, 0x60609746de8c7c97, 0x2}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 643.870128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 643.870142] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 643.870149] RIP: 0033:0x459697 [ 643.877515] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 643.877525] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 643.877530] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 643.877535] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 643.877540] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 643.877545] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:37 executing program 2 (fault-call:3 fault-nth:21): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:37 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x2c4000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r4 = getgid() r5 = getgid() r6 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0xb4, 0x101000) ftruncate(r6, 0x1) r7 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x8001, 0x400) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000540)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f0000000200)=0x3, 0x4) setresgid(r3, r4, r5) perf_event_open(0x0, r2, 0x20, 0xffffffffffffffff, 0x8) syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x47f7560d, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000280)={0x9, 0x4}) r10 = geteuid() ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x2, 0x4, 0x100000001}) write$FUSE_ENTRY(r9, &(0x7f0000000400)={0x90, 0xfffffffffffffff5, 0x1, {0x5, 0x1, 0x3, 0x4, 0xfff, 0x400, {0x4, 0x5, 0x77, 0xffffffffffffffff, 0x0, 0x100000000, 0x3ff, 0xd75d, 0x1f, 0x4, 0x0, r10, r4, 0x7fffffff, 0x4}}}, 0x90) fcntl$setlease(r9, 0x400, 0x3) ioctl$KVM_IRQ_LINE_STATUS(r8, 0xc008ae67, &(0x7f0000000240)={0x1f, 0x1f}) ioctl(r8, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 23:26:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 644.071635] BTRFS error (device loop5): superblock checksum mismatch [ 644.130575] BTRFS error (device loop5): open_ctree failed [ 644.152869] BTRFS error (device loop1): superblock checksum mismatch [ 644.159713] FAULT_INJECTION: forcing a failure. [ 644.159713] name failslab, interval 1, probability 0, space 0, times 0 [ 644.171058] CPU: 1 PID: 17430 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 644.178148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.187486] Call Trace: [ 644.190068] dump_stack+0x138/0x19c [ 644.193691] should_fail.cold+0x10f/0x159 [ 644.197837] should_failslab+0xdb/0x130 [ 644.201803] kmem_cache_alloc+0x47/0x780 [ 644.205845] ? save_stack_trace+0x16/0x20 [ 644.205853] ? save_stack+0x45/0xd0 [ 644.205860] ? kasan_kmalloc+0xce/0xf0 [ 644.205867] ? kasan_slab_alloc+0xf/0x20 [ 644.205875] ? kmem_cache_alloc+0x12e/0x780 [ 644.205884] ? __kernfs_new_node+0x70/0x420 [ 644.205892] ? kernfs_new_node+0x80/0xf0 [ 644.205899] ? __kernfs_create_file+0x46/0x323 [ 644.205911] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 644.217494] idr_get_free_cmn+0x563/0x8d0 [ 644.217505] ? save_trace+0x290/0x290 [ 644.217519] idr_alloc_cmn+0x10e/0x210 [ 644.217530] ? __fprop_inc_percpu_max+0x1e0/0x1e0 [ 644.217540] ? __lock_is_held+0xb6/0x140 [ 644.217549] ? check_preemption_disabled+0x3c/0x250 [ 644.217559] idr_alloc_cyclic+0xd0/0x1e2 [ 644.274005] ? ida_simple_remove+0x60/0x60 [ 644.278220] __kernfs_new_node+0xe4/0x420 [ 644.282352] kernfs_new_node+0x80/0xf0 [ 644.286218] __kernfs_create_file+0x46/0x323 [ 644.290609] sysfs_add_file_mode_ns+0x1e4/0x450 [ 644.295272] internal_create_group+0x232/0x7b0 [ 644.299828] sysfs_create_group+0x20/0x30 [ 644.303952] lo_ioctl+0x1176/0x1ce0 [ 644.307552] ? loop_probe+0x160/0x160 [ 644.311326] blkdev_ioctl+0x96b/0x1860 [ 644.315191] ? blkpg_ioctl+0x980/0x980 [ 644.319067] ? __might_sleep+0x93/0xb0 [ 644.322942] ? __fget+0x210/0x370 [ 644.326389] block_ioctl+0xde/0x120 [ 644.329996] ? blkdev_fallocate+0x3b0/0x3b0 [ 644.334308] do_vfs_ioctl+0x7ae/0x1060 [ 644.338168] ? selinux_file_mprotect+0x5d0/0x5d0 [ 644.342899] ? lock_downgrade+0x6e0/0x6e0 [ 644.347026] ? ioctl_preallocate+0x1c0/0x1c0 [ 644.351407] ? __fget+0x237/0x370 [ 644.354846] ? security_file_ioctl+0x89/0xb0 [ 644.359241] SyS_ioctl+0x8f/0xc0 [ 644.362593] ? do_vfs_ioctl+0x1060/0x1060 [ 644.366725] do_syscall_64+0x1e8/0x640 [ 644.370594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 644.375419] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 644.380585] RIP: 0033:0x459697 [ 644.383750] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 644.391427] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 644.398666] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 644.405911] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 644.413157] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 644.420402] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x80000) bind$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) 23:26:37 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)={0x2, 0x9d, "32313728b7897cdd1d012ba450dd67c09fdbe4faa45ddae025244f8228c13e0b3692f6fbc9f1ea653bd236d9d05644d85bb38f22c60f84ac01c561f947d6cabbefafa4150419d1f5b282c7b2287380ca45fcf22c32534a7ea14fda4923657e97928629a4104282ad57a6ff6edc919043bc5757a1ffcdf92786b2c450db01c4dedff68ff8f064eb09007e09de6c390cd1c4bbf80a609dd4a75b229389c0"}) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x460800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28, &(0x7f0000000200)}, 0x10) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = getegid() r1 = getgid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000200)=[0xffffffffffffffff]) r4 = getgid() getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [], {0x4, 0x2}, [{0x8, 0x7ddb2597e8498993, r0}, {0x8, 0x4, r1}, {0x8, 0x2, r2}, {0x8, 0x2, r3}, {0x8, 0x6, r4}, {0x8, 0x2, r5}, {0x8, 0x1, r6}, {0x8, 0x2, r7}], {}, {0x20, 0x1}}, 0x64, 0x2) 23:26:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 644.461958] BTRFS error (device loop1): open_ctree failed 23:26:37 executing program 2 (fault-call:3 fault-nth:22): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:37 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x200400, 0x0) [ 644.539421] BTRFS error (device loop1): superblock checksum mismatch 23:26:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 644.621213] BTRFS error (device loop1): open_ctree failed [ 644.648210] BTRFS error (device loop1): superblock checksum mismatch [ 644.661644] FAULT_INJECTION: forcing a failure. 23:26:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) sendmmsg$inet(r0, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="0a686749d780b98431e176324351571d893f9c1f3839dea6ec535d00c99759e4d4177f508b7f6c6b283fb5f1385d461481e8d4b5815e0dba0e3b5e20ce0d464e2f1ab818dc6b97af03299e1f3e1bb1d102bb5a74249bc39e5a3e2ded2542ac61b80142f92ca6a799a5cee4d51be22c75f05672eb0e7ab5c33842524a711ea529c6776f8dc6caf38157ebd5e34e01f5eb4f50e7beeb1c285973a539a6891b3594a4f60dd510819992fe59a807", 0xac}], 0x1, &(0x7f00000001c0)=[@ip_retopts={{0x4c, 0x0, 0x7, {[@end, @end, @ra={0x94, 0x6, 0xfffffffffffffbff}, @rr={0x7, 0xf, 0x2, [@multicast1, @remote, @multicast1]}, @timestamp={0x44, 0x10, 0x5, 0x3, 0x9, [{[], 0x100}, {[@empty], 0xffffffff}]}, @lsrr={0x83, 0xb, 0xa2b7, [@multicast1, @local]}, @generic={0x87, 0x9, "8fdfdd7285beeb"}]}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x7, [@loopback]}, @ssrr={0x89, 0x7, 0x3, [@multicast1]}, @lsrr={0x83, 0xb, 0x6, [@multicast2, @multicast2]}, @end, @end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100000000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0xf8}}], 0x1, 0x4800) [ 644.661644] name failslab, interval 1, probability 0, space 0, times 0 [ 644.700985] CPU: 1 PID: 17475 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 644.701526] BTRFS error (device loop1): open_ctree failed [ 644.708082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.708086] Call Trace: [ 644.708100] dump_stack+0x138/0x19c [ 644.708117] should_fail.cold+0x10f/0x159 [ 644.708128] should_failslab+0xdb/0x130 [ 644.729136] kmem_cache_alloc_node+0x287/0x780 [ 644.729153] __alloc_skb+0x9c/0x500 [ 644.729162] ? skb_scrub_packet+0x4b0/0x4b0 [ 644.729170] ? netlink_has_listeners+0x20a/0x330 [ 644.729181] kobject_uevent_env+0x781/0xc23 [ 644.737253] ? internal_create_group+0x49a/0x7b0 [ 644.737270] kobject_uevent+0x20/0x26 [ 644.737279] lo_ioctl+0x11e7/0x1ce0 [ 644.737296] ? loop_probe+0x160/0x160 [ 644.745448] blkdev_ioctl+0x96b/0x1860 [ 644.745457] ? blkpg_ioctl+0x980/0x980 [ 644.745472] ? __might_sleep+0x93/0xb0 [ 644.745479] ? __fget+0x210/0x370 [ 644.745489] block_ioctl+0xde/0x120 [ 644.774679] ? blkdev_fallocate+0x3b0/0x3b0 [ 644.782391] do_vfs_ioctl+0x7ae/0x1060 23:26:38 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)={r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 23:26:38 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x200000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0xffffffffffffffc1, &(0x7f0000000100)="11dca5055e0bcfe47bf070") ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r3, r3}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x2000) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x4e20, @loopback}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:38 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2c001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in6}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 644.782401] ? selinux_file_mprotect+0x5d0/0x5d0 [ 644.782410] ? lock_downgrade+0x6e0/0x6e0 [ 644.782419] ? ioctl_preallocate+0x1c0/0x1c0 [ 644.782429] ? __fget+0x237/0x370 [ 644.782443] ? security_file_ioctl+0x89/0xb0 [ 644.782453] SyS_ioctl+0x8f/0xc0 [ 644.782460] ? do_vfs_ioctl+0x1060/0x1060 [ 644.782474] do_syscall_64+0x1e8/0x640 [ 644.833918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 644.838753] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 644.843932] RIP: 0033:0x459697 [ 644.847106] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 644.854797] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 644.854802] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 644.854806] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 644.854811] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 644.854816] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 644.854960] net_ratelimit: 26 callbacks suppressed [ 644.854963] protocol 88fb is buggy, dev hsr_slave_0 23:26:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0x2, &(0x7f00000001c0)={&(0x7f0000000100)=@getneightbl={0x14, 0x42, 0x1, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0xa}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040000) [ 644.869710] protocol 88fb is buggy, dev hsr_slave_1 [ 644.869788] protocol 88fb is buggy, dev hsr_slave_0 [ 644.884300] protocol 88fb is buggy, dev hsr_slave_1 [ 644.920336] BTRFS error (device loop1): superblock checksum mismatch [ 644.994491] BTRFS error (device loop1): open_ctree failed [ 645.007503] BTRFS error (device loop1): superblock checksum mismatch [ 645.050605] BTRFS error (device loop1): open_ctree failed [ 645.060880] BTRFS error (device loop1): superblock checksum mismatch [ 645.180575] BTRFS error (device loop1): open_ctree failed [ 645.188880] BTRFS error (device loop5): superblock checksum mismatch [ 645.200083] protocol 88fb is buggy, dev hsr_slave_0 [ 645.205106] protocol 88fb is buggy, dev hsr_slave_1 [ 645.210057] protocol 88fb is buggy, dev hsr_slave_0 [ 645.215103] protocol 88fb is buggy, dev hsr_slave_1 23:26:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="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") socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:38 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000001c0)={0x1, 0x19, 0x3, 0x3ff, "2ded9d07be4a4302a8b5c4dea59771b468435988fb0b31295371918f532a177a"}) r2 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000780)={0x0, {{0x2, 0x4e22, @empty}}}, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r2) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000140)) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) getresuid(&(0x7f00000002c0), &(0x7f00000004c0), &(0x7f0000000500)=0x0) r6 = getuid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x4, &(0x7f0000000440)=[{&(0x7f0000000940)="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", 0x1000, 0x6}, {&(0x7f0000000280)="dd183f704ff38adef33d764e315f566dbe16938fcc3dbfcb8cb2cb830987b0e925e5", 0x22, 0x1ff}, {&(0x7f0000000340)="7573b8ad0870f89503f39741b52b12b1dcb76c66c4a5ff37db0e1cef8984bb168e3d80b9b811c504a77c8e28a3ee0a2ad889206657de6e2b694e12add6c4f13a62aab1d479d09f76987e4ee6ce68a5bb31d9757974dd1ca496744abc73799bcb1ba35563e6523703336ba924270248f188ce7286645f5b3777f43827ce6277c4fdbfa4909ba9194f987f4f36e544cabecba6574076352dd54e445b2318b51409993ef0b25bbdfc21793e4e8f7de2fcb4e41333b5a1ce5b0a3ba48b136e1393c9e9fb43276815a6417b6d1e5f3e63d22b23c9b70cd9a343b2c4dfb9ab3fbe65c2e2e8ce6adc", 0xe5, 0xb5a}, {&(0x7f0000001940)="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", 0x1000, 0x1}], 0x8, &(0x7f0000000680)={[{@fat=@uid={'uid', 0x3d, r5}}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@utf8='utf8=1'}, {@uni_xlate='uni_xlate=1'}], [{@audit='audit'}, {@dont_measure='dont_measure'}, {@fowner_gt={'fowner>', r6}}, {@subj_user={'subj_user', 0x3d, 'eth0vmnet1teth0procppp0(!selinux'}}, {@subj_type={'subj_type', 0x3d, 'btrfs\x00'}}, {@uid_eq={'uid', 0x3d, r7}}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 23:26:38 executing program 2 (fault-call:3 fault-nth:23): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000100)) fsync(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x84040, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x5c4f}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x7, 0x8}, &(0x7f0000000240)=0x8) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000100)=0xb2) syz_open_dev$dmmidi(0x0, 0x3ffffffe, 0x240) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x4, 0x80) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f00000002c0)={0x35, 0x3b, 0x3, 0x10, 0x3, 0xe6d, 0x2, 0xd5}) 23:26:38 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14, 0x67, 0x1, {0x5c, 0x4, 0x7}}, 0x14) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 645.280088] BTRFS error (device loop5): open_ctree failed [ 645.325099] FAULT_INJECTION: forcing a failure. [ 645.325099] name failslab, interval 1, probability 0, space 0, times 0 [ 645.336652] CPU: 1 PID: 17528 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 645.343748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.353084] Call Trace: [ 645.355648] dump_stack+0x138/0x19c [ 645.359252] should_fail.cold+0x10f/0x159 [ 645.363378] should_failslab+0xdb/0x130 [ 645.367323] kmem_cache_alloc_node_trace+0x280/0x770 [ 645.372397] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 645.377829] __kmalloc_node_track_caller+0x3d/0x80 [ 645.382745] __kmalloc_reserve.isra.0+0x40/0xe0 [ 645.387388] __alloc_skb+0xcf/0x500 [ 645.390990] ? skb_scrub_packet+0x4b0/0x4b0 [ 645.395290] ? netlink_has_listeners+0x20a/0x330 [ 645.400026] kobject_uevent_env+0x781/0xc23 [ 645.404327] ? internal_create_group+0x49a/0x7b0 [ 645.409057] kobject_uevent+0x20/0x26 [ 645.412838] lo_ioctl+0x11e7/0x1ce0 [ 645.416446] ? loop_probe+0x160/0x160 [ 645.420219] blkdev_ioctl+0x96b/0x1860 [ 645.424082] ? blkpg_ioctl+0x980/0x980 [ 645.427941] ? __might_sleep+0x93/0xb0 [ 645.431801] ? __fget+0x210/0x370 [ 645.435227] block_ioctl+0xde/0x120 [ 645.438826] ? blkdev_fallocate+0x3b0/0x3b0 [ 645.443116] do_vfs_ioctl+0x7ae/0x1060 [ 645.446974] ? selinux_file_mprotect+0x5d0/0x5d0 [ 645.451704] ? lock_downgrade+0x6e0/0x6e0 [ 645.455826] ? ioctl_preallocate+0x1c0/0x1c0 [ 645.460203] ? __fget+0x237/0x370 [ 645.463632] ? security_file_ioctl+0x89/0xb0 [ 645.468010] SyS_ioctl+0x8f/0xc0 [ 645.471349] ? do_vfs_ioctl+0x1060/0x1060 [ 645.475467] do_syscall_64+0x1e8/0x640 [ 645.479330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 645.484151] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 645.489315] RIP: 0033:0x459697 [ 645.492482] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 645.500157] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 645.507406] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 645.514645] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:26:38 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$UI_DEV_DESTROY(r0, 0x5502) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+30000}, {r4, r5/1000+10000}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 645.521886] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 645.529131] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 645.536568] protocol 88fb is buggy, dev hsr_slave_0 [ 645.541640] protocol 88fb is buggy, dev hsr_slave_1 23:26:38 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) mmap(&(0x7f0000bf5000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 645.583810] BTRFS error (device loop1): superblock checksum mismatch 23:26:39 executing program 2 (fault-call:3 fault-nth:24): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000100)=0x1, 0x4) fchdir(r0) r1 = accept4$rose(0xffffffffffffffff, &(0x7f00000001c0)=@full={0xb, @remote, @null, 0x0, [@rose, @rose, @netrom, @rose, @remote, @netrom]}, &(0x7f0000000200)=0x40, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r3, &(0x7f0000000300)={0xffffffffffffffff, r0}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 645.640257] BTRFS error (device loop1): open_ctree failed [ 645.651705] BTRFS error (device loop1): superblock checksum mismatch 23:26:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 645.692585] BTRFS error (device loop1): open_ctree failed [ 645.721824] BTRFS error (device loop1): superblock checksum mismatch [ 645.729657] FAULT_INJECTION: forcing a failure. [ 645.729657] name failslab, interval 1, probability 0, space 0, times 0 [ 645.747503] CPU: 0 PID: 17564 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 645.754599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.754604] Call Trace: [ 645.754619] dump_stack+0x138/0x19c [ 645.754636] should_fail.cold+0x10f/0x159 [ 645.754651] should_failslab+0xdb/0x130 [ 645.754662] kmem_cache_alloc_node+0x287/0x780 [ 645.754677] __alloc_skb+0x9c/0x500 [ 645.754696] ? skb_scrub_packet+0x4b0/0x4b0 [ 645.754712] ? netlink_has_listeners+0x20a/0x330 [ 645.754725] kobject_uevent_env+0x781/0xc23 [ 645.754742] kobject_uevent+0x20/0x26 [ 645.754751] lo_ioctl+0x11e7/0x1ce0 [ 645.754762] ? loop_probe+0x160/0x160 [ 645.754771] blkdev_ioctl+0x96b/0x1860 [ 645.754779] ? blkpg_ioctl+0x980/0x980 [ 645.754792] ? __might_sleep+0x93/0xb0 [ 645.754799] ? __fget+0x210/0x370 [ 645.754810] block_ioctl+0xde/0x120 [ 645.754819] ? blkdev_fallocate+0x3b0/0x3b0 [ 645.754829] do_vfs_ioctl+0x7ae/0x1060 [ 645.774464] ? selinux_file_mprotect+0x5d0/0x5d0 [ 645.774476] ? lock_downgrade+0x6e0/0x6e0 [ 645.774488] ? ioctl_preallocate+0x1c0/0x1c0 [ 645.774501] ? __fget+0x237/0x370 [ 645.854373] ? security_file_ioctl+0x89/0xb0 [ 645.858756] SyS_ioctl+0x8f/0xc0 [ 645.862092] ? do_vfs_ioctl+0x1060/0x1060 [ 645.866211] do_syscall_64+0x1e8/0x640 [ 645.870070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 645.874885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 645.880042] RIP: 0033:0x459697 [ 645.883208] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 645.890891] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 645.898129] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 645.905370] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 645.912608] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 645.919850] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x8000) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0xfffffffffffffffe, 0x8, {0x7, 0x1f, 0x4, 0x20, 0x1, 0x8000, 0x1, 0x3}}, 0x50) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 646.010168] BTRFS error (device loop1): open_ctree failed [ 646.020786] BTRFS error (device loop3): superblock checksum mismatch 23:26:39 executing program 2 (fault-call:3 fault-nth:25): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000002c0)={0x9, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}]}) 23:26:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_mount_image$minix(&(0x7f0000000640)='minix\x00', &(0x7f0000000680)='./file0\x00', 0x1, 0x4, &(0x7f0000000ac0)=[{&(0x7f00000006c0)="3c5378ceeb65b366f557344b94cf66ec7c389d7e57ba8ff4351724f63a279bf2043fce084ec846abd9e9baaee679418abd6bdf06a7335e39bf5db502f784d6fea2e322cb8de0b1a7d58458d738409c61b064b362bcbe2f43fa47f4eb6b3427604b847e8467e2d4a27824b310064eae457eb0b2ed54531d2543ad03e709d939f8746491f3d9dabdf4cb66c71d93f2f4dde3eab27838923f539afe52b05472aec435c4b36f111d1e8488ccab887542de35c21a6a8f88c99348b27d1ab8458288b7", 0xc0, 0x7}, {&(0x7f0000000780)="e63be545048c81fb6bf5f19f80e2591d56b7277451b521b820fcf1ad21e7f128681eff224e189aed8b9c5c47d044f4c385edda3c14e884d164d1b01b60f9809be5d3ae2850c4944e48c1770c9d96d663ee00a6ee7b9e6382f0483e9e6327f80ffe83c54a8a476d6e26ccc5b57612cb7e96a421beb10b24eb0c8edd564e43ccfb190695073802c9de9b8a1a4d7bc0f782c63498bf0d830ff78ff316c2ccb8e21249482a8cc854e82b34a23782c5c85a6d59ed723a969776cdcab23606ffb6b929c187af0e1d7bed041278761880f67ebefc3bf3e3e37debc09fc38f03b372091b015de1", 0xe3, 0x1ff}, {&(0x7f0000000940)="2ba6888effb25667a3b31a8b4ce006392956fd364bafb400abd78c6e3fb177527da28cdd733e61d73776d7433a191c5034c5a09385bd92ac1bdc2ee64dec609bf205dfbf4e87df32730be3c0ecb07f76477cc2b6a1df7343f5ea0fa75bfc2c3e8f8908fcaa054796a5cff1e48b1d7e05c8bab656b98269078e01bb43b8d4799971e9e41e5971c32d7e2cd5c1be5c4a4bad0d3f4aa44ada395a4636d362822d88f9d2f1", 0xa3, 0x4}, {&(0x7f0000000a00)="36891bee03e839e0735e771e68e354dde9fc74c891951a8748d647606d21c7efefda3073713fd18e0e054742a7212110d9008b35923dad3214f2e81f3cb105a252eba7f59a41a560a826948193ca1c241a4c700377f2bf72a24c154951ccab3910c66eb003cb0b0d7a2a072365666df2626009fc92f48e7c74227af8b39b09851185e2a4426b2c586080a8da057f6b296ab52625cc9489c604f42e831042008d8af31c", 0xa3, 0x7081}], 0x2800000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @rand_addr=0x1e}, 0x3, 0x3, 0x3, 0x2}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)="d4e124f9edef306a3bf08371ff60b6298fb1658bd2f5a3fb1b92b68983a54ba08296e491bebfe8c452741df451f688d26a20e71ff3d25e45032897cc8113451e2f414cb2956a7eaf5ee3bece780658651f30f3ecb8a6ad67b6cc28538a6dfba9f68cc673e5abc56342e65a74a2ae8f2c0e98a6a114f46c6562564b3fa702791a07a2cf9b11e4d1ec6923046a57df6a9d354dd67f661bcbe0a6bdc26f81aacb7f689c6730a3b4c7a1244461c947ee7bf26baf8373c97ca0ae1ac0b227990dee58bec6b20216b330f7563c4d5e3855ce68c09ef7e821437b21095958c0ba5203f858945858ceb1083ec8128358d4", 0xed}, {&(0x7f0000000340)="1484f503b0d7013b3c2008aba2c382f0230170633cd0c79ccd7105ab9a8ab715725c416c26c9f3e733eee28eed57810bbffd5243a687591aba16c6450b18f9a138cee1fe1fc6f55331750d328c1b518102b84e646fb3d095ba1a3e50724e51e696d3e8ba52969669411a770aa2cad9f0ae02f14511afbb243c09e2b9cdb6a3bd35737185eaa52982ef4e9a06be71886b9d2b064385416c5683a0364207a9359456b0d6f69ce586481ab188ad979d85b24b5a6fd66ff7a100829222ab0551d9", 0xbf}, {&(0x7f0000000400)="6096ecd5cfca234c6f30e70a68d83a8cbaa68cc642f2216a9c1c45ac6ecae7cbf09ec032ddc8b290fe74bdd5640eb9d7bfd62590a4047c3da5b4cac4559d003638d0e0e8538132031cbbc9f18c1ea3abf8b5b00eb0664bfd480c1153bffb2b576fb488ded0e73c392238a5c14edd173752a4015d24f6e314013bb824c7ebfd3b99b0974753ceb28a5cc166c6a8a1546f8f90326651", 0x95}], 0x3, &(0x7f00000004c0)=[{0x110, 0x112, 0x0, "47d4f75d3d71ca0420ea6e3c25c8bacdd6a98300d25ac48b776a59f469a2148dc33ab5abd6b6f292665e1956265419053045d3697cf70c42ecfd4644f28b844bfa15e3876f7e1b6db7564dc865d6a3626b601a94e42bd87f01b3ef03a4e33e46277d1c5f58cdaae6ac1800fad089c1094641b13811b07ec012de77377671e12dce9af82ba5486daa441fbec7756cb7660183911f47ecb7fa55542872995b905726f2f1714bc13fad265f9544be3a6866db85a78a78c594cc64a945e3f7cd261fc13250bccb26fe25e21affac7dc2de5a8568b9d527238a975a8e73290e7b0e1f73e77d7e2d503cd5bc8dbc1d207f569368619f851ce036e330"}], 0x110}, 0x4e65a3bcced1d3d4) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x2, 0x100) [ 646.090425] BTRFS error (device loop3): open_ctree failed [ 646.153095] BTRFS error (device loop5): superblock checksum mismatch [ 646.186772] FAULT_INJECTION: forcing a failure. [ 646.186772] name failslab, interval 1, probability 0, space 0, times 0 23:26:39 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x2c4000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r4 = getgid() r5 = getgid() r6 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0xb4, 0x101000) ftruncate(r6, 0x1) r7 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x8001, 0x400) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000540)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f0000000200)=0x3, 0x4) setresgid(r3, r4, r5) perf_event_open(0x0, r2, 0x20, 0xffffffffffffffff, 0x8) syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x47f7560d, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000280)={0x9, 0x4}) r10 = geteuid() ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x2, 0x4, 0x100000001}) write$FUSE_ENTRY(r9, &(0x7f0000000400)={0x90, 0xfffffffffffffff5, 0x1, {0x5, 0x1, 0x3, 0x4, 0xfff, 0x400, {0x4, 0x5, 0x77, 0xffffffffffffffff, 0x0, 0x100000000, 0x3ff, 0xd75d, 0x1f, 0x4, 0x0, r10, r4, 0x7fffffff, 0x4}}}, 0x90) fcntl$setlease(r9, 0x400, 0x3) ioctl$KVM_IRQ_LINE_STATUS(r8, 0xc008ae67, &(0x7f0000000240)={0x1f, 0x1f}) ioctl(r8, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 646.210553] BTRFS error (device loop5): open_ctree failed [ 646.220009] CPU: 1 PID: 17592 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 646.227112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.236450] Call Trace: [ 646.239036] dump_stack+0x138/0x19c [ 646.239054] should_fail.cold+0x10f/0x159 [ 646.239067] should_failslab+0xdb/0x130 [ 646.239079] kmem_cache_alloc_node_trace+0x280/0x770 [ 646.239089] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 646.239102] __kmalloc_node_track_caller+0x3d/0x80 [ 646.246914] __kmalloc_reserve.isra.0+0x40/0xe0 [ 646.246924] __alloc_skb+0xcf/0x500 [ 646.246933] ? skb_scrub_packet+0x4b0/0x4b0 [ 646.246943] ? netlink_has_listeners+0x20a/0x330 [ 646.246954] kobject_uevent_env+0x781/0xc23 [ 646.246968] kobject_uevent+0x20/0x26 [ 646.292001] lo_ioctl+0x11e7/0x1ce0 [ 646.292014] ? loop_probe+0x160/0x160 [ 646.299404] blkdev_ioctl+0x96b/0x1860 [ 646.299414] ? blkpg_ioctl+0x980/0x980 [ 646.307146] ? __might_sleep+0x93/0xb0 23:26:39 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000280)={0x0, 0x4, 0x4, 0xe000, {}, {0x4, 0x8, 0x3, 0x0, 0x242, 0x9, "a66a6274"}, 0x10001, 0x3, @planes=&(0x7f0000000240)={0x200, 0x39e, @fd=0xffffffffffffffff, 0x4}, 0x4}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, r0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x25, "dab488aa9e1ae7eb036f6365250c69f8e453454b162f561475f6b74a5a276d4261dda1c547"}, &(0x7f0000000180)=0x2d) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0x800}, 0x8) 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x40) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 646.307158] ? __fget+0x210/0x370 [ 646.307167] block_ioctl+0xde/0x120 [ 646.307176] ? blkdev_fallocate+0x3b0/0x3b0 [ 646.322370] do_vfs_ioctl+0x7ae/0x1060 [ 646.326247] ? selinux_file_mprotect+0x5d0/0x5d0 [ 646.330992] ? lock_downgrade+0x6e0/0x6e0 [ 646.335128] ? ioctl_preallocate+0x1c0/0x1c0 [ 646.339530] ? __fget+0x237/0x370 [ 646.342981] ? security_file_ioctl+0x89/0xb0 [ 646.347382] SyS_ioctl+0x8f/0xc0 [ 646.350746] ? do_vfs_ioctl+0x1060/0x1060 [ 646.354884] do_syscall_64+0x1e8/0x640 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x401000008912, &(0x7f0000000200)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000001c0)=0x100000000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000140)={'\x01\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x0e\x00'}, &(0x7f00000000c0)=0x78) [ 646.358761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 646.363602] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 646.368778] RIP: 0033:0x459697 [ 646.371954] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 646.379649] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 646.386894] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 646.394138] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 646.401387] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x40000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@ipv4={[], [], @loopback}, 0x1, 0x2, 0x0, 0xd5f04a95fc66e4ac, 0x9, 0x48ea}, 0x20) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = accept4(r0, 0x0, &(0x7f00000000c0), 0x800) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000140)={0x7, 0x1, 0x7c, 0xfffffffffffffffd, 0x100000000}, 0xc) [ 646.408637] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 646.419706] BTRFS error (device loop5): superblock checksum mismatch 23:26:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xfffffffffffffff7, 0x2) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000340)=0x43) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x138, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x124, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}}, {0x14, 0x2, @in={0x2, 0x4e21, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x9, @remote, 0xec4f}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0x10}, 0xfff}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @rand_addr="6541bf1c0fe85dec64eb7431a05fb5bf", 0x200}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffffe}]}]}, 0x138}}, 0x40) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r1 = perf_event_open(0x0, r0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f2a2a4e23cafd4c5f5c821466696c653020627472667300206274726673002029f40a1285dacf6513d8e5bdccc939da6657eb3f502fd69ce1345baaac7f6cdfa565f1783ff70e99b5c73d5ace078c4a17c95c563e813c88fcdc734ee6a9000000000000000000000000a1030a9d8d8b3cf13f1e2dd8169afe7cf701d2f7a8cb7670830ad1288611980f1d27"], 0x63) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1e0, r4, 0x8, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffb}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff00000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffff9}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x87}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xaa67}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfe9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x100, @mcast2, 0x800}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x48814}, 0x850) accept$nfc_llcp(r3, &(0x7f0000000140), &(0x7f00000001c0)=0x60) [ 646.502514] BTRFS error (device loop5): open_ctree failed [ 646.512781] BTRFS error (device loop5): superblock checksum mismatch [ 646.580848] BTRFS error (device loop5): open_ctree failed [ 646.591321] BTRFS error (device loop1): superblock checksum mismatch 23:26:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x80, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e1ccfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:39 executing program 2 (fault-call:3 fault-nth:26): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:39 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x8, 0x0, 0x3, 0x10000}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0xfff}, &(0x7f0000000200)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f00000000c0)={0x10, 0x20, 0x101, 0xb631}, 0x10) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 646.632633] BTRFS error (device loop1): open_ctree failed [ 646.643444] BTRFS error (device loop3): superblock checksum mismatch [ 646.679277] FAULT_INJECTION: forcing a failure. [ 646.679277] name failslab, interval 1, probability 0, space 0, times 0 [ 646.691006] BTRFS error (device loop3): open_ctree failed [ 646.694509] CPU: 1 PID: 17654 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 646.703616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.703620] Call Trace: [ 646.703636] dump_stack+0x138/0x19c [ 646.703653] should_fail.cold+0x10f/0x159 [ 646.703668] should_failslab+0xdb/0x130 [ 646.703682] kmem_cache_alloc_node_trace+0x280/0x770 [ 646.703693] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 646.703706] __kmalloc_node_track_caller+0x3d/0x80 [ 646.703718] __kmalloc_reserve.isra.0+0x40/0xe0 [ 646.703727] __alloc_skb+0xcf/0x500 [ 646.703736] ? skb_scrub_packet+0x4b0/0x4b0 [ 646.703746] ? netlink_has_listeners+0x20a/0x330 [ 646.703757] kobject_uevent_env+0x781/0xc23 [ 646.703773] kobject_uevent+0x20/0x26 [ 646.719270] lo_ioctl+0x11e7/0x1ce0 [ 646.732423] ? loop_probe+0x160/0x160 [ 646.732435] blkdev_ioctl+0x96b/0x1860 [ 646.732443] ? blkpg_ioctl+0x980/0x980 [ 646.732459] ? __might_sleep+0x93/0xb0 [ 646.786973] ? __fget+0x210/0x370 [ 646.790398] block_ioctl+0xde/0x120 [ 646.793996] ? blkdev_fallocate+0x3b0/0x3b0 [ 646.798288] do_vfs_ioctl+0x7ae/0x1060 [ 646.802150] ? selinux_file_mprotect+0x5d0/0x5d0 [ 646.806880] ? lock_downgrade+0x6e0/0x6e0 [ 646.811001] ? ioctl_preallocate+0x1c0/0x1c0 [ 646.815379] ? __fget+0x237/0x370 [ 646.818807] ? security_file_ioctl+0x89/0xb0 [ 646.823186] SyS_ioctl+0x8f/0xc0 [ 646.826523] ? do_vfs_ioctl+0x1060/0x1060 [ 646.830644] do_syscall_64+0x1e8/0x640 [ 646.834503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 646.839321] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 646.844481] RIP: 0033:0x459697 [ 646.847645] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 646.855324] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 646.862567] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 646.869808] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:26:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ax25_int(r0, 0x101, 0xb, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x201, 0x0) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000080)={0x0, 0x19}) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, &(0x7f00000000c0)) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x183941, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000100)={0xffffffff, 0x3}) 23:26:40 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000002c0)={0x9, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}]}) [ 646.877051] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 646.884292] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 646.900877] BTRFS error (device loop5): superblock checksum mismatch 23:26:40 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x84080, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='btrfs\x00') perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff, r0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:40 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x7fffffff, 0xfffffffffffffffb) fallocate(r0, 0x4, 0x7, 0xb3) 23:26:40 executing program 2 (fault-call:3 fault-nth:27): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 647.030151] BTRFS error (device loop5): open_ctree failed [ 647.038207] BTRFS error (device loop1): superblock checksum mismatch [ 647.076903] FAULT_INJECTION: forcing a failure. [ 647.076903] name failslab, interval 1, probability 0, space 0, times 0 [ 647.089106] CPU: 1 PID: 17686 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 647.096199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.096203] Call Trace: [ 647.096217] dump_stack+0x138/0x19c [ 647.096235] should_fail.cold+0x10f/0x159 [ 647.096251] should_failslab+0xdb/0x130 [ 647.096264] kmem_cache_alloc_node_trace+0x280/0x770 [ 647.096276] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 647.096290] __kmalloc_node_track_caller+0x3d/0x80 [ 647.096304] __kmalloc_reserve.isra.0+0x40/0xe0 [ 647.096313] __alloc_skb+0xcf/0x500 [ 647.096321] ? skb_scrub_packet+0x4b0/0x4b0 [ 647.096331] ? netlink_has_listeners+0x20a/0x330 [ 647.096343] kobject_uevent_env+0x781/0xc23 [ 647.111842] kobject_uevent+0x20/0x26 [ 647.111852] lo_ioctl+0x11e7/0x1ce0 [ 647.111863] ? loop_probe+0x160/0x160 [ 647.128134] BTRFS error (device loop1): open_ctree failed [ 647.130415] blkdev_ioctl+0x96b/0x1860 [ 647.130423] ? blkpg_ioctl+0x980/0x980 [ 647.130438] ? __might_sleep+0x93/0xb0 [ 647.130445] ? __fget+0x210/0x370 [ 647.130455] block_ioctl+0xde/0x120 [ 647.130464] ? blkdev_fallocate+0x3b0/0x3b0 [ 647.140009] do_vfs_ioctl+0x7ae/0x1060 [ 647.140021] ? selinux_file_mprotect+0x5d0/0x5d0 [ 647.140029] ? lock_downgrade+0x6e0/0x6e0 [ 647.140038] ? ioctl_preallocate+0x1c0/0x1c0 [ 647.140048] ? __fget+0x237/0x370 [ 647.140062] ? security_file_ioctl+0x89/0xb0 [ 647.140072] SyS_ioctl+0x8f/0xc0 23:26:40 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000002c0)={0x9, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}]}) 23:26:40 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$admmidi(&(0x7f0000000640)='/dev/admmidi#\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000680)=0x1f, 0x4) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 647.140084] ? do_vfs_ioctl+0x1060/0x1060 [ 647.140096] do_syscall_64+0x1e8/0x640 [ 647.140103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 647.140117] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 647.140124] RIP: 0033:0x459697 [ 647.140128] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 647.140137] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 647.140143] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 647.140147] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:26:40 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x800, 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0xa, 0x80000, 0xffffffffffff7fff) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0xbcba, 0x208000) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000340)={0xa717, 0xd36, 0x6, 0x6f, 0x654f, 0x1000, 0xe2, 0x0, 0x2, 0x5, 0xfffffffffffffffe, 0x4, 0x0, 0x1f, &(0x7f0000000280)=""/156, 0x1f, 0x2, 0x1}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x9, @loopback, 0x9}}, 0xdd, 0x7f, 0x100, 0x80000001, 0x60}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r3, 0x7, 0x1, [0x8ec]}, &(0x7f0000000200)=0xa) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x2}], 0xf43, 0x0) [ 647.140151] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 647.140156] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:40 executing program 2 (fault-call:3 fault-nth:28): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:40 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000180)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = dup3(r0, r0, 0x80000) sendmsg$nfc_llcp(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x27, 0x1, 0x0, 0x0, 0x0, 0x4, "494548aa1c014311c9a8cdda7d5ae223757cfa325bb3d2f7556d42ecabca03d64b8789260e6a576c83f496b1f82068db76e91932b2ff324462333517b3b9bc", 0x28}, 0x60, &(0x7f0000000280)=[{&(0x7f0000000240)="f48064e1245264a69a8d7c179778a17e4d3d14d7d765b3dd", 0x18}], 0x1, &(0x7f0000000340)={0xa8, 0x1bf, 0x4, "1bec41f568cd8e48d18d05bde5f1d56d870469b635a5acfbafc64fb035e008f282f0b041a496ec9007fd1b5135ddb79620d166a76d0ec9dd276d9f9a118293910b1424ee802c9862dcd94d335497737667503cc840262ae221e8bfd62b19a7d5bddf09ee346b2757355ac2a71bc04a8a4068841dd6cea17c50ac38526799ce71dcdd5a28a02affb77214876c2928c8c571"}, 0xa8, 0x1}, 0xef9ad65ceeae63d) accept4$bt_l2cap(r2, 0x0, &(0x7f0000000400), 0xe1a048560095c5f3) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'irlan0\x00', @remote}) 23:26:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x6, @rand_addr="42b4878735db4ab72f91549b0ceecfd2", 0x1fe73c9e}, @in6={0xa, 0x4e24, 0x5, @local, 0x8d}], 0x38) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 647.352192] BTRFS error (device loop1): superblock checksum mismatch [ 647.429415] FAULT_INJECTION: forcing a failure. [ 647.429415] name failslab, interval 1, probability 0, space 0, times 0 [ 647.447975] CPU: 0 PID: 17717 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 647.455074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.464413] Call Trace: [ 647.466974] dump_stack+0x138/0x19c [ 647.470594] should_fail.cold+0x10f/0x159 [ 647.474719] should_failslab+0xdb/0x130 [ 647.478664] kmem_cache_alloc_node_trace+0x280/0x770 [ 647.483739] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 647.489159] __kmalloc_node_track_caller+0x3d/0x80 [ 647.494069] __kmalloc_reserve.isra.0+0x40/0xe0 [ 647.498709] __alloc_skb+0xcf/0x500 [ 647.502304] ? skb_scrub_packet+0x4b0/0x4b0 [ 647.506604] ? netlink_has_listeners+0x20a/0x330 [ 647.511339] kobject_uevent_env+0x781/0xc23 [ 647.515639] kobject_uevent+0x20/0x26 [ 647.519415] lo_ioctl+0x11e7/0x1ce0 [ 647.523027] ? loop_probe+0x160/0x160 [ 647.526801] blkdev_ioctl+0x96b/0x1860 [ 647.530665] ? blkpg_ioctl+0x980/0x980 [ 647.534535] ? __might_sleep+0x93/0xb0 [ 647.538400] ? __fget+0x210/0x370 [ 647.541830] block_ioctl+0xde/0x120 [ 647.545424] ? blkdev_fallocate+0x3b0/0x3b0 [ 647.549716] do_vfs_ioctl+0x7ae/0x1060 [ 647.553581] ? selinux_file_mprotect+0x5d0/0x5d0 [ 647.558316] ? lock_downgrade+0x6e0/0x6e0 [ 647.562444] ? ioctl_preallocate+0x1c0/0x1c0 [ 647.566835] ? __fget+0x237/0x370 [ 647.570269] ? security_file_ioctl+0x89/0xb0 [ 647.574653] SyS_ioctl+0x8f/0xc0 [ 647.577991] ? do_vfs_ioctl+0x1060/0x1060 [ 647.582109] do_syscall_64+0x1e8/0x640 [ 647.585967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 647.590782] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 647.595939] RIP: 0033:0x459697 [ 647.599101] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 647.606777] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 647.614019] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 647.621259] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 647.628501] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 647.635751] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 647.710391] BTRFS error (device loop1): open_ctree failed [ 647.720261] BTRFS error (device loop1): superblock checksum mismatch [ 647.770394] BTRFS error (device loop1): open_ctree failed [ 647.785286] BTRFS error (device loop3): superblock checksum mismatch 23:26:41 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000000100), 0xf43, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8400002}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x4, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x84}, 0x8840) 23:26:41 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000002c0)={0x9, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}]}) 23:26:41 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = socket$inet(0x2, 0x1, 0x2) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x6c00) perf_event_open(0x0, 0x0, 0x23, r1, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x100, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000800)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000000100)=[{&(0x7f0000000680)="5c313b3905c3328715a9523fe80e95fe687a948f987aa0635f6ff554ad09e5ba578a10e3dde794ccaa24bfac40bf71cdee6d07409a558133e5f0ac277b57003058d6720cc52b93ae23262fe54450a758c5dcefc6d961c2bec2b48cc13b3a90493699368c4dc35593", 0x68, 0x1}, {&(0x7f0000000300)="275b8eafcafe144e09cffecede4bcf4c6516839b6ae25aaf3d8fcc879a5e1a5234169683633b5caeedc68fc6a3dbcf1e2987d8332ebc7ab76dd3f2093e40cc342ab9e7b0169088ff6e", 0x49, 0x7f}, {&(0x7f0000000380)="99047ad2a5717bc951ed0ec4556a1053f7c0b7e161d29296ff0abbfdf16d9b678b175b741232cb8a9883476bf834233a917f66eaee1c1fb83ab9f94aff01226f1778aea6c1c230bf6b6a7cc2e9c0547691042748897238130172e339bfba6612c2d396d6e88266765720902662e993aab4a038f14f0954619cca940e9101034e8dfd6a2e42396d7f99dfb39d8268cb6071b27df5bba47cb327dc8d5226956cd9ae9994591238f2b5d0a232f4e27f3236b45830423543a06c564fa6f379c1", 0xbe, 0x770}, {&(0x7f0000000700)="381c0547a40a5771493e1591c97651e8ac837059451380da0dae62822127cc2a899aa56d31be098347018a5e6ab37f56430b162ad52bb25d4c6fb2e69a74dbeaa1e1fe08f8c74c01ec440315e3e4bdba18bf895c692824712bfa5b6bffb823511ba9396c94069a0879ef7e6b10d91c8e74c8e4482bcc9248652b2f71aed0247bef42df030d8126c7b5155dbdd9667dc1c01820f8ca6f04e8c54ccaf81d3e969a0db4e4debc8be1eef374fe683edd404d8e7fe53c814c310e979f84cfa951217b77190f7e6770788727493f664194051b8150ed0cc3eafe27c5cde4b92fc167ae3b3c85e0910fa301d7161328e9aab3", 0xef, 0x2}, {&(0x7f0000000540)="8918f00be34025132b3538017317c0672ebdebf5c891a0d3877d16b4740578fce1ca7e0f6aa940ec9d80cef1d317b20bf070a1e60f2440e3db58ecc5d536b76758400f95c5dff1ecbe6c2978eb5f5230b961274b8300ef6973a9c8edb14b6d0e4ae86bcf9eb25273b1445476dadc907fbfa8d466570a58c547eaf5f67858951cdecd36356935d8e4cc26cdb5951973", 0x8f, 0x6}], 0xf43, 0x0) 23:26:41 executing program 2 (fault-call:3 fault-nth:29): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 647.843876] BTRFS error (device loop3): open_ctree failed [ 647.907275] BTRFS error (device loop1): superblock checksum mismatch [ 647.915361] FAULT_INJECTION: forcing a failure. [ 647.915361] name failslab, interval 1, probability 0, space 0, times 0 [ 647.928117] CPU: 1 PID: 17750 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 647.935226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.935233] Call Trace: [ 647.947136] dump_stack+0x138/0x19c [ 647.950770] should_fail.cold+0x10f/0x159 [ 647.950784] should_failslab+0xdb/0x130 [ 647.950794] kmem_cache_alloc_node+0x287/0x780 [ 647.950810] __alloc_skb+0x9c/0x500 [ 647.950818] ? skb_scrub_packet+0x4b0/0x4b0 [ 647.950827] ? netlink_has_listeners+0x20a/0x330 [ 647.950839] kobject_uevent_env+0x781/0xc23 [ 647.950855] kobject_uevent+0x20/0x26 [ 647.950864] lo_ioctl+0x11e7/0x1ce0 [ 647.950874] ? loop_probe+0x160/0x160 [ 647.950883] blkdev_ioctl+0x96b/0x1860 [ 647.950890] ? blkpg_ioctl+0x980/0x980 [ 647.950903] ? __might_sleep+0x93/0xb0 [ 647.950910] ? __fget+0x210/0x370 [ 647.950921] block_ioctl+0xde/0x120 [ 647.950928] ? blkdev_fallocate+0x3b0/0x3b0 [ 647.950936] do_vfs_ioctl+0x7ae/0x1060 [ 647.950947] ? selinux_file_mprotect+0x5d0/0x5d0 [ 647.950955] ? lock_downgrade+0x6e0/0x6e0 [ 647.950964] ? ioctl_preallocate+0x1c0/0x1c0 [ 647.950973] ? __fget+0x237/0x370 [ 647.950986] ? security_file_ioctl+0x89/0xb0 [ 647.950996] SyS_ioctl+0x8f/0xc0 [ 647.951009] ? do_vfs_ioctl+0x1060/0x1060 [ 647.951021] do_syscall_64+0x1e8/0x640 [ 647.951028] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 647.951041] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 647.951047] RIP: 0033:0x459697 [ 647.951052] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 647.951060] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 647.951065] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 23:26:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1000, 0x80800) read$rfkill(r1, &(0x7f0000000100), 0x8) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x36c, 0x1}], 0xf43, 0x0) 23:26:41 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x200}, 0x28, 0x2) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x900) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0xff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xcf}, &(0x7f0000000280)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 647.951069] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 647.951074] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 647.951078] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 648.136939] BTRFS error (device loop1): open_ctree failed 23:26:41 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x268030fc52e7b1e6) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000200)={{0x9, 0x4, 0x7, 0x0, 'syz0\x00', 0x100000001}, 0x2, 0x3, 0x6, r1, 0x7, 0x9, 'syz1\x00', &(0x7f0000000180)=['$cpuset[system%/$&.locpusetmd5sum#wlan0&nodev\x00', '[{nodeveth1ppp1]\\{\x00', '\x00', '\x00', 'btrfs\x00', 'btrfs\x00', '\x00'], 0x50, [], [0x0, 0xfffffffffffffffc, 0x4, 0x1]}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0xdc1676671f9185f5, 0x1) 23:26:41 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed000000faffffff01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:41 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) 23:26:41 executing program 2 (fault-call:3 fault-nth:30): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:41 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000140)=""/139) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e4bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x1b1, &(0x7f0000000100)=0x2) [ 648.334487] BTRFS error (device loop3): superblock checksum mismatch 23:26:41 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2102, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 648.380691] BTRFS error (device loop3): open_ctree failed [ 648.388204] BTRFS error (device loop3): superblock checksum mismatch [ 648.460268] BTRFS error (device loop3): open_ctree failed [ 648.472568] BTRFS error (device loop5): superblock checksum mismatch [ 648.483418] FAULT_INJECTION: forcing a failure. [ 648.483418] name failslab, interval 1, probability 0, space 0, times 0 [ 648.506804] CPU: 1 PID: 17813 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 648.513988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.523317] Call Trace: [ 648.525879] dump_stack+0x138/0x19c [ 648.529485] should_fail.cold+0x10f/0x159 [ 648.533608] should_failslab+0xdb/0x130 [ 648.537555] kmem_cache_alloc_node+0x287/0x780 [ 648.542114] __alloc_skb+0x9c/0x500 [ 648.545710] ? skb_scrub_packet+0x4b0/0x4b0 [ 648.550005] ? netlink_has_listeners+0x20a/0x330 [ 648.554741] kobject_uevent_env+0x781/0xc23 [ 648.559036] kobject_uevent+0x20/0x26 [ 648.562808] lo_ioctl+0x11e7/0x1ce0 [ 648.566406] ? loop_probe+0x160/0x160 [ 648.570181] blkdev_ioctl+0x96b/0x1860 [ 648.574038] ? blkpg_ioctl+0x980/0x980 [ 648.577902] ? __might_sleep+0x93/0xb0 [ 648.581758] ? __fget+0x210/0x370 [ 648.585187] block_ioctl+0xde/0x120 [ 648.588782] ? blkdev_fallocate+0x3b0/0x3b0 [ 648.593077] do_vfs_ioctl+0x7ae/0x1060 [ 648.596937] ? selinux_file_mprotect+0x5d0/0x5d0 [ 648.601666] ? lock_downgrade+0x6e0/0x6e0 [ 648.605788] ? ioctl_preallocate+0x1c0/0x1c0 [ 648.610170] ? __fget+0x237/0x370 [ 648.613600] ? security_file_ioctl+0x89/0xb0 [ 648.617979] SyS_ioctl+0x8f/0xc0 [ 648.621317] ? do_vfs_ioctl+0x1060/0x1060 [ 648.625436] do_syscall_64+0x1e8/0x640 [ 648.629296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 648.634113] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 648.639270] RIP: 0033:0x459697 [ 648.642434] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 648.650113] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 23:26:42 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/113, 0x71) [ 648.657353] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 648.664595] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 648.671841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 648.679079] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:42 executing program 0: syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x5, 0x20482) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000100)) 23:26:42 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000140)={{0x77359400}, {r0, r1/1000+30000}}, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x2440c1, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f00000003c0)) r3 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000001c0)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$caif_stream(0x25, 0x1, 0x4) connect(r5, &(0x7f0000000200)=@pptp={0x18, 0x2, {0x2, @broadcast}}, 0x80) syz_mount_image$btrfs(&(0x7f0000000400)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xffffffffffffffa2, 0x10000}], 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000340)) [ 648.724763] BTRFS error (device loop5): open_ctree failed [ 648.794916] BTRFS error (device loop1): superblock checksum mismatch 23:26:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000180)) ioctl$sock_ifreq(r0, 0x8927, &(0x7f00000000c0)={'gretap0\x00', @ifru_map={0x2, 0x1, 0x100, 0x5, 0x1, 0x6}}) 23:26:42 executing program 2 (fault-call:3 fault-nth:31): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:42 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 648.850215] BTRFS error (device loop1): open_ctree failed [ 648.857661] BTRFS error (device loop1): superblock checksum mismatch 23:26:42 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x11, 0xffffffffffffffff, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 648.920974] BTRFS error (device loop1): open_ctree failed [ 648.928408] FAULT_INJECTION: forcing a failure. [ 648.928408] name failslab, interval 1, probability 0, space 0, times 0 [ 648.942453] BTRFS error (device loop1): superblock checksum mismatch [ 648.956234] CPU: 1 PID: 17866 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 648.963329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.963334] Call Trace: [ 648.963349] dump_stack+0x138/0x19c [ 648.963366] should_fail.cold+0x10f/0x159 [ 648.963379] should_failslab+0xdb/0x130 [ 648.963390] kmem_cache_alloc_node+0x287/0x780 [ 648.963408] __alloc_skb+0x9c/0x500 [ 648.963416] ? skb_scrub_packet+0x4b0/0x4b0 [ 648.963430] ? netlink_has_listeners+0x20a/0x330 [ 648.963441] kobject_uevent_env+0x781/0xc23 [ 648.995358] kobject_uevent+0x20/0x26 [ 648.995370] lo_ioctl+0x11e7/0x1ce0 [ 648.995382] ? loop_probe+0x160/0x160 [ 649.019872] blkdev_ioctl+0x96b/0x1860 [ 649.023737] ? blkpg_ioctl+0x980/0x980 [ 649.027601] ? __might_sleep+0x93/0xb0 [ 649.031470] ? __fget+0x210/0x370 [ 649.034909] block_ioctl+0xde/0x120 [ 649.038521] ? blkdev_fallocate+0x3b0/0x3b0 [ 649.042812] do_vfs_ioctl+0x7ae/0x1060 [ 649.046672] ? selinux_file_mprotect+0x5d0/0x5d0 [ 649.051406] ? lock_downgrade+0x6e0/0x6e0 [ 649.055532] ? ioctl_preallocate+0x1c0/0x1c0 [ 649.059911] ? __fget+0x237/0x370 [ 649.063339] ? security_file_ioctl+0x89/0xb0 [ 649.067726] SyS_ioctl+0x8f/0xc0 [ 649.071066] ? do_vfs_ioctl+0x1060/0x1060 [ 649.075193] do_syscall_64+0x1e8/0x640 [ 649.079048] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 649.083861] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 649.089021] RIP: 0033:0x459697 [ 649.092187] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 649.099873] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 649.107116] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 649.114355] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:26:42 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/90, 0x5a}, {&(0x7f00000001c0)=""/116, 0x74}, {&(0x7f0000000340)=""/252, 0xfc}, {&(0x7f0000000240)}], 0x4, &(0x7f0000000440)=""/199, 0xc7}, 0x2120) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000140)={0x18, 0x0, 0x1, {0x257}}, 0x18) getsockname$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000480)) rt_sigaction(0xc, &(0x7f0000000200)={&(0x7f0000000180)="44d271b80f0f93e3d6cf52ae410f0f0e0cc40321795aa6a6c4817d70dae266440fe1e38f0af81085008000001c4fdabb66430f10e18fc900024b4a0fa8", {0x3}, 0x80000000, &(0x7f00000001c0)="c4827d18a55e3c0000c4e13d6bd6c403955db7fcfbb31009c4429d9314fef3f00fb0a29b0000000f38ccdd4568dc0000008fa9a89628c401fee6f765400f01d6"}, &(0x7f00000002c0)={&(0x7f0000000240)="664f0f6e845a9761000036430f18c5c4e218f3096443f7d40f01c1c4027921b20d000000470f65c2c422a99d6457bd36ded5c4c17bf033", {}, 0x0, &(0x7f0000000280)="c4e37d052a42c403c95f396f8f8908013c9d181471204483870e0000000df30fa7d0c42148145b5a45c8b70000c4427bf52866660fea11f30f2ae2"}, 0x8, &(0x7f0000000300)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x1) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000340)=""/127) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x65, &(0x7f00000004c0)=0xbeb9358b215b818, 0x4) 23:26:42 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x99, 0x8100) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000400)=@req={0x7, 0x4, 0x401, 0xffffffff}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e24, @empty}, 0x10) [ 649.121606] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 649.128844] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:42 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:42 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 649.200426] BTRFS error (device loop1): open_ctree failed [ 649.214726] BTRFS error (device loop1): superblock checksum mismatch 23:26:42 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 649.272719] BTRFS error (device loop1): open_ctree failed [ 649.292460] BTRFS error (device loop5): superblock checksum mismatch [ 649.343650] BTRFS error (device loop5): open_ctree failed [ 649.353433] BTRFS error (device loop5): superblock checksum mismatch 23:26:42 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20ncci\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x80, &(0x7f0000000500)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0xffffffffffff0000, @mcast2, 0x7}, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x26}}, 0x4}, @in6={0xa, 0x4e24, 0x6, @loopback, 0xbbe}, @in6={0xa, 0x4e23, 0x45, @rand_addr="e14046d173e781ff881180fe170278da", 0x100}]}, &(0x7f00000005c0)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000600)=@assoc_value={r2}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:42 executing program 2 (fault-call:3 fault-nth:32): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 649.470154] BTRFS error (device loop5): open_ctree failed [ 649.478355] BTRFS error (device loop5): superblock checksum mismatch [ 649.505185] FAULT_INJECTION: forcing a failure. [ 649.505185] name failslab, interval 1, probability 0, space 0, times 0 [ 649.516546] CPU: 1 PID: 17921 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 649.523640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.532981] Call Trace: [ 649.535561] dump_stack+0x138/0x19c [ 649.539167] should_fail.cold+0x10f/0x159 [ 649.543292] should_failslab+0xdb/0x130 [ 649.547240] kmem_cache_alloc_node+0x287/0x780 [ 649.551796] __alloc_skb+0x9c/0x500 [ 649.555396] ? skb_scrub_packet+0x4b0/0x4b0 [ 649.559690] ? netlink_has_listeners+0x20a/0x330 [ 649.564420] kobject_uevent_env+0x781/0xc23 [ 649.568715] kobject_uevent+0x20/0x26 [ 649.572490] lo_ioctl+0x11e7/0x1ce0 [ 649.576093] ? loop_probe+0x160/0x160 [ 649.579868] blkdev_ioctl+0x96b/0x1860 [ 649.583727] ? blkpg_ioctl+0x980/0x980 [ 649.587587] ? __might_sleep+0x93/0xb0 [ 649.591446] ? __fget+0x210/0x370 [ 649.594870] block_ioctl+0xde/0x120 [ 649.598468] ? blkdev_fallocate+0x3b0/0x3b0 [ 649.602761] do_vfs_ioctl+0x7ae/0x1060 [ 649.606624] ? selinux_file_mprotect+0x5d0/0x5d0 [ 649.611354] ? lock_downgrade+0x6e0/0x6e0 [ 649.615475] ? ioctl_preallocate+0x1c0/0x1c0 [ 649.619862] ? __fget+0x237/0x370 [ 649.623293] ? security_file_ioctl+0x89/0xb0 [ 649.627672] SyS_ioctl+0x8f/0xc0 [ 649.631008] ? do_vfs_ioctl+0x1060/0x1060 [ 649.635131] do_syscall_64+0x1e8/0x640 [ 649.638991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 649.643811] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 649.648968] RIP: 0033:0x459697 [ 649.652128] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 649.659807] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 23:26:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = dup(0xffffffffffffffff) recvfrom$inet(r0, &(0x7f0000000140)=""/109, 0x6d, 0x42, &(0x7f00000001c0)={0x2, 0x4e20, @local}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x585a, 0x400480) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e24, 0x4, @remote}, 0x1c) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000100)={0x1ff, 0xc0000, 0x1, 0x100, 0x8, 0x1d, 0xc, "07425d0c2dec8ffda85cc2919fd74cf44df74fcc", "3f847aaea828b66c36e448f8fa59c87fe4324374"}) 23:26:43 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) write$eventfd(r1, &(0x7f0000000180)=0x1, 0x8) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000100)={0x3, 0x4, 0xbd6, 0x5, 0xb2, 0x2, 0x4, 0x0, 0x0, 0x81, 0x100, 0x222e7eee, 0x8000, 0xf7, &(0x7f0000000940)=""/4096, 0x5, 0x1b, 0x401}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000001c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x200400, 0x0) 23:26:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x48000, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000100)={0x7, 0x1, 0x5, {0x4, 0x1, 0x7, 0x1}}) syz_open_dev$dmmidi(0x0, 0x3, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:43 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) mmap(&(0x7f0000c07000/0xc000)=nil, 0xc000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000580)={0x28, 0x0, 0x2711, @reserved}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x10015) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x0, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x440840}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xff4f) setitimer(0x1, &(0x7f00000002c0)={{}, {0x0, 0x2710}}, 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000000100)=0x2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x400000, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000240)='systee]u:object_r:wystemd_logMnf_var_run_t:s0\x00', 0x2e, 0x0) r5 = request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000440)='}}!GPLvmnet1vmnet1nodevcgroup\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r5) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000001c0)={0x0, 0x0, {0x80, 0x100, 0x7, 0xbec}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, 0xffffffffffffffff, &(0x7f0000000480)={r2}) socket$inet_udplite(0x2, 0x2, 0x88) bind$tipc(r0, 0x0, 0x0) 23:26:43 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 649.667063] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 649.674305] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 649.681549] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 649.688791] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 649.701805] BTRFS error (device loop5): open_ctree failed 23:26:43 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:43 executing program 2 (fault-call:3 fault-nth:33): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 649.838640] BTRFS error (device loop3): superblock checksum mismatch 23:26:43 executing program 5: socketpair(0x11, 0x7, 0x8, &(0x7f00000000c0)={0xffffffffffffffff}) connect$netrom(r0, &(0x7f00000002c0)={{0x3, @null, 0x894}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast]}, 0x48) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r2 = dup3(r1, r1, 0x0) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x101400) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x0, 0x0, @pic={0x861d, 0xe547, 0x2, 0x6, 0x1, 0x2, 0x20, 0x1, 0x5, 0x8001, 0x0, 0x3, 0x7, 0x4, 0x77, 0x5}}) 23:26:43 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 649.940411] BTRFS error (device loop3): open_ctree failed [ 649.954494] BTRFS error (device loop1): superblock checksum mismatch [ 649.986822] FAULT_INJECTION: forcing a failure. [ 649.986822] name failslab, interval 1, probability 0, space 0, times 0 [ 650.025426] CPU: 0 PID: 17961 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 650.032611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.041951] Call Trace: [ 650.044531] dump_stack+0x138/0x19c [ 650.048154] should_fail.cold+0x10f/0x159 [ 650.052291] should_failslab+0xdb/0x130 [ 650.056253] kmem_cache_alloc_node_trace+0x280/0x770 [ 650.061343] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 650.066781] __kmalloc_node_track_caller+0x3d/0x80 [ 650.071695] __kmalloc_reserve.isra.0+0x40/0xe0 [ 650.076351] __alloc_skb+0xcf/0x500 [ 650.079964] ? skb_scrub_packet+0x4b0/0x4b0 [ 650.084274] ? netlink_has_listeners+0x20a/0x330 [ 650.089019] kobject_uevent_env+0x781/0xc23 [ 650.093334] kobject_uevent+0x20/0x26 [ 650.097121] lo_ioctl+0x11e7/0x1ce0 [ 650.100738] ? loop_probe+0x160/0x160 [ 650.104523] blkdev_ioctl+0x96b/0x1860 [ 650.108393] ? blkpg_ioctl+0x980/0x980 [ 650.112269] ? __might_sleep+0x93/0xb0 [ 650.116137] ? __fget+0x210/0x370 [ 650.119575] block_ioctl+0xde/0x120 [ 650.123185] ? blkdev_fallocate+0x3b0/0x3b0 [ 650.127492] do_vfs_ioctl+0x7ae/0x1060 [ 650.131362] ? selinux_file_mprotect+0x5d0/0x5d0 [ 650.136098] ? lock_downgrade+0x6e0/0x6e0 [ 650.140231] ? ioctl_preallocate+0x1c0/0x1c0 [ 650.144624] ? __fget+0x237/0x370 [ 650.148068] ? security_file_ioctl+0x89/0xb0 [ 650.152464] SyS_ioctl+0x8f/0xc0 [ 650.155817] ? do_vfs_ioctl+0x1060/0x1060 [ 650.159960] do_syscall_64+0x1e8/0x640 [ 650.163841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 650.168683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 650.173854] RIP: 0033:0x459697 [ 650.177030] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 650.184726] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 650.191976] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 650.199230] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 650.206482] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 650.213736] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 650.222780] BTRFS error (device loop1): open_ctree failed 23:26:43 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 650.243630] BTRFS error (device loop5): superblock checksum mismatch 23:26:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ustat(0xffffffff, &(0x7f00000000c0)) [ 650.330169] BTRFS error (device loop5): open_ctree failed [ 650.356974] BTRFS error (device loop5): superblock checksum mismatch 23:26:43 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x1, {{0x2, 0x4e22, @loopback}}}, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:43 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:43 executing program 2 (fault-call:3 fault-nth:34): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:43 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000280)={0x0, 0x80000}) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000300)={r1, 0x80000, r2}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x5, &(0x7f00000001c0)="11dcfdff55fde24bdc2a8d38c563db4dd1c2ad085eb9e2c8e96c2438c3a031a9abd4730830b143b1f1ddb3259b48aed61c14bb6a99a4ecd3ef59b2ee507f55171adc32dbd8b92ff8319590439b7f8cdcfc330fbe877645a37b3f5db5aa54f80dda0704f4dd2e241e6800") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCX25GCALLUSERDATA(r4, 0x89e4, &(0x7f0000000100)={0x5a, "f2e479335cc8d74a733f719531956f2324be8481d64eb43417fc85eac2ac82edee092283f7a7ba8daeda8cab41d04f30002f9ebda666d76f7290247cb49789af5033d2f834dde96354f5b94dc79ea818eed600aed2e70568262689460d46c86679929885ddefc638e9c19ee6fa3521b07463ccb910c147ceb41fdbdecc6501a6"}) [ 650.413904] BTRFS error (device loop5): open_ctree failed [ 650.489085] BTRFS error (device loop1): superblock checksum mismatch [ 650.537523] FAULT_INJECTION: forcing a failure. [ 650.537523] name failslab, interval 1, probability 0, space 0, times 0 [ 650.565293] CPU: 1 PID: 18000 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 650.572402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.572406] Call Trace: [ 650.572423] dump_stack+0x138/0x19c [ 650.572441] should_fail.cold+0x10f/0x159 [ 650.572459] should_failslab+0xdb/0x130 [ 650.572474] kmem_cache_alloc_node+0x287/0x780 [ 650.572493] __alloc_skb+0x9c/0x500 [ 650.572503] ? skb_scrub_packet+0x4b0/0x4b0 [ 650.572518] ? netlink_has_listeners+0x20a/0x330 [ 650.572533] kobject_uevent_env+0x781/0xc23 [ 650.572552] kobject_uevent+0x20/0x26 [ 650.572564] lo_ioctl+0x11e7/0x1ce0 [ 650.572578] ? loop_probe+0x160/0x160 [ 650.596270] blkdev_ioctl+0x96b/0x1860 [ 650.596279] ? blkpg_ioctl+0x980/0x980 [ 650.596293] ? __might_sleep+0x93/0xb0 [ 650.596302] ? __fget+0x210/0x370 [ 650.608771] block_ioctl+0xde/0x120 [ 650.617801] ? blkdev_fallocate+0x3b0/0x3b0 [ 650.617811] do_vfs_ioctl+0x7ae/0x1060 [ 650.617822] ? selinux_file_mprotect+0x5d0/0x5d0 [ 650.617831] ? lock_downgrade+0x6e0/0x6e0 [ 650.617839] ? ioctl_preallocate+0x1c0/0x1c0 [ 650.617849] ? __fget+0x237/0x370 [ 650.617863] ? security_file_ioctl+0x89/0xb0 [ 650.617872] SyS_ioctl+0x8f/0xc0 [ 650.629022] ? do_vfs_ioctl+0x1060/0x1060 23:26:44 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:44 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x202000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f00000002c0)=0x7fff, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x9, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x97f, 0x442c80) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000140)=0x2) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) [ 650.629035] do_syscall_64+0x1e8/0x640 [ 650.629043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 650.629057] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 650.629065] RIP: 0033:0x459697 [ 650.629069] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 650.636812] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 650.636819] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 650.636823] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:26:44 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0xfffffffffffffffd) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20040) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x80, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x800) 23:26:44 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 650.636829] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 650.636834] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 650.749303] BTRFS error (device loop1): open_ctree failed [ 650.765996] BTRFS error (device loop3): superblock checksum mismatch 23:26:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xa86, 0x80000) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000100)=0x80) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xd) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:44 executing program 2 (fault-call:3 fault-nth:35): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:44 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 650.811331] BTRFS error (device loop3): open_ctree failed [ 650.823336] BTRFS error (device loop3): superblock checksum mismatch 23:26:44 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = semget$private(0x0, 0x3, 0x8) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000140)=""/114) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0xffff}], 0x0, 0x0) 23:26:44 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/211, 0xd3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x203, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000240)={0x20, 0x0, 0x2, {0x0, 0x2}}, 0x20) [ 650.906577] FAULT_INJECTION: forcing a failure. [ 650.906577] name failslab, interval 1, probability 0, space 0, times 0 [ 650.925028] CPU: 1 PID: 18033 Comm: syz-executor.2 Not tainted 4.14.139 #35 23:26:44 executing program 2 (fault-call:3 fault-nth:36): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 650.925038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.925043] Call Trace: [ 650.925058] dump_stack+0x138/0x19c [ 650.925080] should_fail.cold+0x10f/0x159 [ 650.925095] should_failslab+0xdb/0x130 [ 650.925107] kmem_cache_alloc_node_trace+0x280/0x770 [ 650.925118] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 650.925132] __kmalloc_node_track_caller+0x3d/0x80 [ 650.925143] __kmalloc_reserve.isra.0+0x40/0xe0 [ 650.925153] __alloc_skb+0xcf/0x500 [ 650.925162] ? skb_scrub_packet+0x4b0/0x4b0 [ 650.925170] ? netlink_has_listeners+0x20a/0x330 [ 650.925181] kobject_uevent_env+0x781/0xc23 [ 650.925198] kobject_uevent+0x20/0x26 [ 650.925208] lo_ioctl+0x11e7/0x1ce0 [ 650.925220] ? loop_probe+0x160/0x160 [ 650.925231] blkdev_ioctl+0x96b/0x1860 [ 650.925241] ? blkpg_ioctl+0x980/0x980 [ 650.925258] ? __might_sleep+0x93/0xb0 [ 650.925267] ? __fget+0x210/0x370 [ 650.925278] block_ioctl+0xde/0x120 [ 650.925288] ? blkdev_fallocate+0x3b0/0x3b0 [ 650.925294] do_vfs_ioctl+0x7ae/0x1060 [ 650.925303] ? selinux_file_mprotect+0x5d0/0x5d0 [ 650.925312] ? lock_downgrade+0x6e0/0x6e0 [ 650.925318] ? ioctl_preallocate+0x1c0/0x1c0 [ 650.925325] ? __fget+0x237/0x370 [ 650.925335] ? security_file_ioctl+0x89/0xb0 [ 650.925343] SyS_ioctl+0x8f/0xc0 [ 650.925349] ? do_vfs_ioctl+0x1060/0x1060 [ 650.925357] do_syscall_64+0x1e8/0x640 [ 650.925365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 650.925380] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 650.925386] RIP: 0033:0x459697 [ 650.925390] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 650.925400] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 650.925407] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 650.925412] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 650.925418] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 650.925424] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 650.941157] BTRFS error (device loop3): open_ctree failed [ 650.958484] BTRFS error (device loop1): superblock checksum mismatch [ 651.020110] BTRFS error (device loop1): open_ctree failed [ 651.216778] net_ratelimit: 25 callbacks suppressed [ 651.216782] protocol 88fb is buggy, dev hsr_slave_0 [ 651.226753] protocol 88fb is buggy, dev hsr_slave_1 [ 651.231860] protocol 88fb is buggy, dev hsr_slave_0 [ 651.236898] protocol 88fb is buggy, dev hsr_slave_1 [ 651.268171] BTRFS error (device loop5): superblock checksum mismatch [ 651.275022] FAULT_INJECTION: forcing a failure. [ 651.275022] name failslab, interval 1, probability 0, space 0, times 0 [ 651.296296] CPU: 1 PID: 18062 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 651.303480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.303485] Call Trace: [ 651.303501] dump_stack+0x138/0x19c [ 651.303518] should_fail.cold+0x10f/0x159 [ 651.303533] should_failslab+0xdb/0x130 [ 651.303548] kmem_cache_alloc_node_trace+0x280/0x770 [ 651.303562] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 651.303575] __kmalloc_node_track_caller+0x3d/0x80 [ 651.303588] __kmalloc_reserve.isra.0+0x40/0xe0 [ 651.303598] __alloc_skb+0xcf/0x500 [ 651.303607] ? skb_scrub_packet+0x4b0/0x4b0 [ 651.303619] ? netlink_has_listeners+0x20a/0x330 [ 651.359773] kobject_uevent_env+0x781/0xc23 [ 651.364071] kobject_uevent+0x20/0x26 [ 651.367843] lo_ioctl+0x11e7/0x1ce0 [ 651.371442] ? loop_probe+0x160/0x160 [ 651.375214] blkdev_ioctl+0x96b/0x1860 [ 651.379070] ? blkpg_ioctl+0x980/0x980 [ 651.382936] ? __might_sleep+0x93/0xb0 [ 651.386793] ? __fget+0x210/0x370 [ 651.390222] block_ioctl+0xde/0x120 [ 651.393819] ? blkdev_fallocate+0x3b0/0x3b0 [ 651.398110] do_vfs_ioctl+0x7ae/0x1060 [ 651.401971] ? selinux_file_mprotect+0x5d0/0x5d0 [ 651.406701] ? lock_downgrade+0x6e0/0x6e0 [ 651.410821] ? ioctl_preallocate+0x1c0/0x1c0 [ 651.415199] ? __fget+0x237/0x370 [ 651.418626] ? security_file_ioctl+0x89/0xb0 [ 651.423007] SyS_ioctl+0x8f/0xc0 [ 651.426343] ? do_vfs_ioctl+0x1060/0x1060 [ 651.430467] do_syscall_64+0x1e8/0x640 [ 651.434324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 651.439143] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 651.440075] protocol 88fb is buggy, dev hsr_slave_0 [ 651.444306] RIP: 0033:0x459697 [ 651.449323] protocol 88fb is buggy, dev hsr_slave_1 [ 651.452448] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 651.452458] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000459697 [ 651.452463] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 651.452467] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 651.452473] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 651.494067] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 651.501545] protocol 88fb is buggy, dev hsr_slave_0 [ 651.506585] protocol 88fb is buggy, dev hsr_slave_1 23:26:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fchdir(r0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c6163636573733d616e2f886163636573733d616e792c6163633520733d616e792c706f73697861636c2c736d61636b6673666c6f6f723d6d643573756d65746830442570707031212c00"]) 23:26:44 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:44 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0xfffffffffffffffd) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10200008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x200, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x7}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000041}, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:44 executing program 3: 23:26:44 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 651.590115] BTRFS error (device loop5): open_ctree failed 23:26:45 executing program 2 (fault-call:3 fault-nth:37): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:45 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x101001) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x6) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:45 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@rc={0x1f, {0x4, 0x2, 0xfffffffffffffffc, 0x1, 0x1f, 0xffffffffffff4daa}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)="63e677a454780593f339ab2c805dc47ba190db320814b6bb4ce0e0e28b74f9c6c9c9b46fb732db23b95f90c8d89cb047300325910cdeaa23ae0a5b2c56db3a2d880ccbe275c8aeb2efe51e3bdcd3b165213cb81d7726413931f144f903c866a9e72ba12a8229f1bd254e1a1b0a66ae0918816785c78baf07cf28dfa0c863", 0x7e}, {&(0x7f0000000240)="67cfe7958a7250ddc24d68b0846676b1d2a5d10f4605ffe10e3c8e5aa23c890c67214ba551e9e927f6ea07eafe3e2981de07779fbcefdf56d556cee62651919819f131dc569d5c195866af7f", 0x4c}, {&(0x7f0000000340)="533627fecce4661a1b914a86bf1643cf9be06299ae02e493b55772815307e21d2e2a46826be2b2a41892478b4fd4bb0af4d9d9affbe718e71ae44ae1d696959374f12c9d8ca1e4bdb2e8d47ca326ef5cff4a4d06e1b0d0a1b732da78bf08d1d6f2f4c775be3a57a52e73fee18cb16eebe5d3def29fc4bc576237f611b1ac213d59d42aeaeb9af0a700254a6d9c8890acd18180422b7921193f0d8bc696093e1549fb6c309f75c98e99086f38bcba11a794286b422b4f64ade2e25b9c4f9e8ee530d3a3bb609b7c2291f8613201dd3f19b21411b2ab80a9548b191713f97b5e2b8d2d06601d5a6bb3ca2a95388c7314d99c65cf42f03db1a0afc9cb36f9b9", 0xfe}, {&(0x7f00000002c0)="b9b17830410e573f6bb7066423935f15f1c522c6ae6a2cea29cf2f", 0x1b}], 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x14f8}, 0x20000000) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 651.671492] BTRFS error (device loop1): superblock checksum mismatch [ 651.740713] FAULT_INJECTION: forcing a failure. [ 651.740713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 651.752514] CPU: 1 PID: 18094 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 651.759596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.759602] Call Trace: [ 651.759617] dump_stack+0x138/0x19c [ 651.759632] should_fail.cold+0x10f/0x159 [ 651.759653] __alloc_pages_nodemask+0x1d6/0x7a0 [ 651.775135] ? fs_reclaim_acquire+0x20/0x20 [ 651.775148] ? __alloc_pages_slowpath+0x2930/0x2930 [ 651.775166] cache_grow_begin+0x80/0x400 [ 651.775177] kmem_cache_alloc+0x6a6/0x780 [ 651.783946] ? selinux_file_mprotect+0x5d0/0x5d0 [ 651.783956] ? lock_downgrade+0x6e0/0x6e0 [ 651.783970] getname_flags+0xcb/0x580 [ 651.783980] SyS_mkdir+0x7e/0x200 [ 651.793278] ? SyS_mkdirat+0x210/0x210 [ 651.793286] ? do_syscall_64+0x53/0x640 [ 651.793295] ? SyS_mkdirat+0x210/0x210 [ 651.793305] do_syscall_64+0x1e8/0x640 [ 651.793312] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:45 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:45 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10, 0x10, 0xffffffffffffffff, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x4, 0x20}, &(0x7f0000000140)=0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0xffffffff, 0x1, 0x4, 0x380000000000, 0x8000, 0x2, 0x10000, 0x6, r2}, &(0x7f00000001c0)=0x20) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 651.793327] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 651.793334] RIP: 0033:0x458c47 [ 651.793339] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 651.793349] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 651.793354] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 651.793359] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 651.875939] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 23:26:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x4000010001, 0x2) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 651.875945] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 651.876087] protocol 88fb is buggy, dev hsr_slave_0 [ 651.876126] protocol 88fb is buggy, dev hsr_slave_1 [ 651.884162] BTRFS error (device loop1): open_ctree failed [ 651.887080] BTRFS error (device loop1): superblock checksum mismatch [ 651.933176] BTRFS error (device loop1): open_ctree failed [ 651.942915] BTRFS error (device loop1): superblock checksum mismatch 23:26:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000080)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x13f, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:45 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x316, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:45 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:45 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r2, 0x80024322) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:45 executing program 2 (fault-call:3 fault-nth:38): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 652.000827] BTRFS error (device loop1): open_ctree failed 23:26:45 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:45 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x6000, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000140)={0x3ff, 0x1}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in=@multicast2, 0x4e23, 0x8, 0x4e20, 0x121600000000000, 0xa, 0x0, 0x0, 0x0, 0x0, r2}, {0x4, 0x101, 0x800, 0x2, 0x0, 0x4, 0x65cc2240, 0xc69}, {0x100000001, 0x4000800000, 0x3, 0x3}, 0x38000, 0x6e6bb5, 0x1, 0x0, 0x1, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d3, 0x3c}, 0x2, @in=@empty, 0x3501, 0x8270b410c87d1bc7, 0x1, 0x401, 0x4, 0x40, 0x1}}, 0xe8) [ 652.100923] BTRFS error (device loop1): superblock checksum mismatch [ 652.124230] FAULT_INJECTION: forcing a failure. [ 652.124230] name failslab, interval 1, probability 0, space 0, times 0 [ 652.148032] CPU: 0 PID: 18143 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 652.155135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.164755] Call Trace: [ 652.164778] dump_stack+0x138/0x19c [ 652.164795] should_fail.cold+0x10f/0x159 [ 652.164810] should_failslab+0xdb/0x130 [ 652.164824] kmem_cache_alloc+0x2d7/0x780 [ 652.164832] ? __d_lookup+0x3a2/0x670 [ 652.164844] ? mark_held_locks+0xb1/0x100 [ 652.191071] ? d_lookup+0xe5/0x240 [ 652.191082] __d_alloc+0x2d/0x9f0 [ 652.198027] d_alloc+0x4d/0x270 [ 652.198037] __lookup_hash+0x58/0x180 [ 652.198045] filename_create+0x16c/0x430 [ 652.198056] ? kern_path_mountpoint+0x40/0x40 [ 652.213580] SyS_mkdir+0x92/0x200 [ 652.217010] ? SyS_mkdirat+0x210/0x210 [ 652.220870] ? do_syscall_64+0x53/0x640 [ 652.224811] ? SyS_mkdirat+0x210/0x210 [ 652.228671] do_syscall_64+0x1e8/0x640 [ 652.232529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 652.237345] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 652.242508] RIP: 0033:0x458c47 [ 652.245672] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 652.253349] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 652.260587] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 652.267827] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 652.275069] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 652.282312] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 652.296678] BTRFS error (device loop1): open_ctree failed [ 652.309742] BTRFS error (device loop1): superblock checksum mismatch 23:26:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xe43d913ef51fd77b, &(0x7f0000000100)={@remote, @local}, &(0x7f0000000140)=0xc) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000180)={0x595, 0xc470, 0x7fffffff, 0xfff, 0x13, 0x20, 0xe4ff, 0x9b4a, 0x1, 0x0, 0x149, 0x6}) 23:26:45 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xa00, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000140)={0x4, 0x6, 0x100000001, 'queue0\x00', 0x80000000}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:45 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:45 executing program 2 (fault-call:3 fault-nth:39): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:45 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 652.420206] BTRFS error (device loop1): open_ctree failed [ 652.431484] BTRFS error (device loop1): superblock checksum mismatch [ 652.459007] Unknown ioctl -1064545482 [ 652.488601] FAULT_INJECTION: forcing a failure. [ 652.488601] name failslab, interval 1, probability 0, space 0, times 0 [ 652.497537] Unknown ioctl -1064545482 [ 652.505871] CPU: 1 PID: 18174 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 652.512973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.522309] Call Trace: [ 652.524896] dump_stack+0x138/0x19c [ 652.524911] should_fail.cold+0x10f/0x159 23:26:45 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$int_out(r0, 0x2, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0xfffd}], 0x0, 0x0) [ 652.524927] should_failslab+0xdb/0x130 [ 652.524938] kmem_cache_alloc+0x2d7/0x780 [ 652.524953] ? check_preemption_disabled+0x3c/0x250 [ 652.524964] ? ext4_sync_fs+0x800/0x800 [ 652.524973] ext4_alloc_inode+0x1d/0x610 [ 652.524981] alloc_inode+0x64/0x180 [ 652.524989] new_inode_pseudo+0x19/0xf0 [ 652.524996] new_inode+0x1f/0x40 [ 652.525006] __ext4_new_inode+0x32c/0x4860 [ 652.525023] ? avc_has_perm+0x2df/0x4b0 [ 652.525033] ? ext4_free_inode+0x1210/0x1210 [ 652.525047] ? dquot_get_next_dqblk+0x160/0x160 23:26:45 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r1 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x1000}) r2 = dup(r1) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000040)=0xae3) r3 = socket$inet_udplite(0x2, 0x2, 0x88) flistxattr(r3, &(0x7f0000000140)=""/218, 0xda) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d0100000000000000009acd0000000000fff6f2a2299748aeb81e1b00920efd9a00d80c000000000001000000000000805f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 652.525063] ext4_mkdir+0x331/0xc20 [ 652.525078] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 652.525088] ? security_inode_mkdir+0xd0/0x110 [ 652.525100] vfs_mkdir+0x3ca/0x610 [ 652.525110] SyS_mkdir+0x1b7/0x200 [ 652.525119] ? SyS_mkdirat+0x210/0x210 [ 652.525127] ? do_syscall_64+0x53/0x640 [ 652.525135] ? SyS_mkdirat+0x210/0x210 [ 652.525144] do_syscall_64+0x1e8/0x640 [ 652.525152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 652.525164] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 652.525171] RIP: 0033:0x458c47 [ 652.525175] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 652.525183] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 652.525188] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 652.525193] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 652.525197] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 652.525202] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 652.529659] BTRFS error (device loop1): open_ctree failed 23:26:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0x280000) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000380)=0x1, 0x248) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000140)={{0xe7a7, 0x2}, 'port0\x00', 0x8, 0x18100c, 0x0, 0xffffffffffffff86, 0xfffffffffffff800, 0x1ff, 0x7f, 0x0, 0x2, 0xffffffffffffff81}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000240)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e20, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0xfffffffffffffc59, 0xfa00, {&(0x7f0000000040), r2}}, 0xffffffffffffffe1) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000480)='btrfs\x00', &(0x7f00000004c0)='./file0\x00', 0x81, 0x0, &(0x7f0000000100), 0xe43, 0x0) 23:26:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:46 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 652.688152] BTRFS error (device loop5): superblock checksum mismatch 23:26:46 executing program 2 (fault-call:3 fault-nth:40): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 652.745742] BTRFS error (device loop5): open_ctree failed [ 652.759714] BTRFS error (device loop3): superblock checksum mismatch [ 652.811212] BTRFS error (device loop3): open_ctree failed [ 652.818272] FAULT_INJECTION: forcing a failure. [ 652.818272] name failslab, interval 1, probability 0, space 0, times 0 [ 652.830046] CPU: 1 PID: 18213 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 652.837131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.837146] Call Trace: [ 652.837159] dump_stack+0x138/0x19c [ 652.837172] should_fail.cold+0x10f/0x159 [ 652.856780] should_failslab+0xdb/0x130 [ 652.856791] __kmalloc+0x71/0x7a0 [ 652.856799] ? mls_compute_context_len+0x3f6/0x5e0 [ 652.856810] ? context_struct_to_string+0x33a/0x630 [ 652.869086] context_struct_to_string+0x33a/0x630 [ 652.869097] ? dump_masked_av_helper+0x90/0x90 [ 652.869111] security_sid_to_context_core+0x18a/0x200 [ 652.869121] security_sid_to_context_force+0x2b/0x40 [ 652.869131] selinux_inode_init_security+0x493/0x700 [ 652.878939] ? selinux_inode_create+0x30/0x30 [ 652.878949] ? kfree+0x20a/0x270 [ 652.878964] security_inode_init_security+0x18d/0x360 [ 652.878972] ? ext4_init_acl+0x1f0/0x1f0 [ 652.878981] ? security_kernel_post_read_file+0xd0/0xd0 [ 652.888701] ? posix_acl_create+0xf5/0x3a0 [ 652.888714] ? ext4_set_acl+0x400/0x400 [ 652.888723] ? lock_downgrade+0x6e0/0x6e0 [ 652.888733] ext4_init_security+0x34/0x40 [ 652.888744] __ext4_new_inode+0x3385/0x4860 [ 652.941877] ? ext4_free_inode+0x1210/0x1210 [ 652.946261] ? dquot_get_next_dqblk+0x160/0x160 [ 652.950917] ext4_mkdir+0x331/0xc20 [ 652.954528] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 652.959174] ? security_inode_mkdir+0xd0/0x110 [ 652.963729] vfs_mkdir+0x3ca/0x610 [ 652.967242] SyS_mkdir+0x1b7/0x200 [ 652.970763] ? SyS_mkdirat+0x210/0x210 [ 652.974628] ? do_syscall_64+0x53/0x640 [ 652.978572] ? SyS_mkdirat+0x210/0x210 [ 652.982433] do_syscall_64+0x1e8/0x640 [ 652.986376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 652.991201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 652.996387] RIP: 0033:0x458c47 [ 652.999563] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 653.007248] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 653.014494] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 653.021734] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 653.028973] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 653.036211] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:46 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000340)={0xa0001, 0x0, [0xed, 0x6, 0x1, 0x10000, 0x0, 0x3, 0x0, 0x6]}) recvfrom$rxrpc(r0, &(0x7f0000000200)=""/139, 0x8b, 0x1, &(0x7f00000002c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x4}], 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000001c0)={0xffffffffffff0001, 0xfff, 0x3}) syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0x8, 0x101041) syz_open_dev$radio(&(0x7f00000005c0)='/dev/radio#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x8c, r2, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffff7f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xe2a8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}]}]}, 0x8c}}, 0x40000) 23:26:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcf70000000") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x400000, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x40000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = open(&(0x7f00000000c0)='./file1\x00', 0xbc7ecf03e0ff922d, 0x166669b4e437e47) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@empty, @in6=@dev={0xfe, 0x80, [], 0x12}, 0x4e24, 0x20, 0x4e21, 0x2, 0xa, 0x20, 0x20, 0x87, 0x0, r1}, {0x5, 0xd0e5, 0x100000001, 0x3, 0x2, 0x52bf, 0x1, 0x9}, {0xffffffff80000001, 0x80, 0x9, 0x3ff}, 0xfffffffffffffff7, 0x6e6bba, 0x0, 0x0, 0x1, 0x2}, {{@in6=@rand_addr="52282ccfef441aef3ab43bc7921f72d0", 0x4d4, 0x6c}, 0x0, @in6=@rand_addr="194a71c8661b332cab07598498da71ef", 0x0, 0x1, 0x0, 0xffffffff, 0x9, 0x101}}, 0xe8) 23:26:46 executing program 2 (fault-call:3 fault-nth:41): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 653.105030] BTRFS error (device loop3): superblock checksum mismatch [ 653.140197] BTRFS error (device loop3): open_ctree failed 23:26:46 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x42200, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000140)="7fb7acb6cf4bda4fed12daa66586ba7ee30d360bd17f3f4d65f895b882fad889d2dba32290823cfa3875b59644bc7945aac8a29edf7c37199231dfe7680d0d4fc5e0f16b1276d79b3b8f10dbfd38402637481a7ce0435332726d4ce2be1a5d1ff5a0ddbb50519b3f1f59e170a84f7513f69e", &(0x7f00000001c0)=""/128}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000003c0)={0x1, 0x3, 0x116000, 0x1000, &(0x7f0000af3000/0x1000)=nil}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000380)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), r2, r0}}, 0x18) 23:26:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 653.223005] BTRFS error (device loop5): superblock checksum mismatch [ 653.237089] FAULT_INJECTION: forcing a failure. [ 653.237089] name failslab, interval 1, probability 0, space 0, times 0 23:26:46 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') 23:26:46 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 653.281202] BTRFS error (device loop5): open_ctree failed [ 653.288915] CPU: 0 PID: 18235 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 653.296005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.296079] Call Trace: [ 653.296092] dump_stack+0x138/0x19c [ 653.296105] should_fail.cold+0x10f/0x159 [ 653.296118] should_failslab+0xdb/0x130 [ 653.296127] __kmalloc+0x2f0/0x7a0 [ 653.296139] ? ext4_find_extent+0x709/0x960 [ 653.296149] ext4_find_extent+0x709/0x960 [ 653.296159] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 653.296169] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 653.296178] ? save_trace+0x290/0x290 [ 653.296190] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 653.296195] ? __lock_is_held+0xb6/0x140 [ 653.296209] ? lock_acquire+0x16f/0x430 [ 653.296218] ? ext4_map_blocks+0x402/0x17c0 [ 653.296232] ext4_map_blocks+0xd3c/0x17c0 [ 653.296240] ? __lock_is_held+0xb6/0x140 [ 653.296249] ? check_preemption_disabled+0x3c/0x250 [ 653.296260] ? ext4_issue_zeroout+0x160/0x160 23:26:46 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000280)=r1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x6, 0x0) bind$rxrpc(r2, &(0x7f0000000200)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @mcast1, 0x400}}, 0x24) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) recvfrom$rxrpc(r2, &(0x7f0000000480)=""/114, 0x72, 0x12000, 0x0, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000140)='veth0_to_bridge\x00') getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sysinfo(&(0x7f0000000380)=""/205) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000340)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x40, 0x400000) [ 653.296269] ? __brelse+0x50/0x60 [ 653.296283] ext4_getblk+0xac/0x450 [ 653.296292] ? ext4_iomap_begin+0x8a0/0x8a0 [ 653.296302] ? ext4_free_inode+0x1210/0x1210 [ 653.296312] ext4_bread+0x6e/0x1a0 [ 653.296320] ? ext4_getblk+0x450/0x450 [ 653.296333] ext4_append+0x14b/0x360 [ 653.296342] ext4_mkdir+0x531/0xc20 [ 653.296355] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 653.296367] ? security_inode_mkdir+0xd0/0x110 [ 653.296379] vfs_mkdir+0x3ca/0x610 [ 653.296389] SyS_mkdir+0x1b7/0x200 [ 653.296398] ? SyS_mkdirat+0x210/0x210 [ 653.296407] ? do_syscall_64+0x53/0x640 [ 653.296415] ? SyS_mkdirat+0x210/0x210 [ 653.296424] do_syscall_64+0x1e8/0x640 [ 653.296430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 653.296443] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 653.296450] RIP: 0033:0x458c47 [ 653.296454] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 653.296463] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 653.296467] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 23:26:46 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000480)=0x1) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x5) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000140)={0x35a847e1802a2de3, r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r4 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x7, 0xff, 0xc, 0x5, 0x7, 0x0, 0x5, 0x9, 0x0}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000340)={r5, 0x9, 0x0, 0x2f0, 0xfffffffffffffff7, 0x8, 0x3f, 0x2, {r6, @in={{0x2, 0x4e23, @empty}}, 0x88, 0x0, 0x100000000, 0x6, 0x3}}, &(0x7f00000002c0)=0xb0) 23:26:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) write$binfmt_aout(r0, &(0x7f0000000940)={{0x0, 0x7fffffff, 0xa247, 0x15d, 0xbe, 0xffffffffffffa28e, 0x2be, 0xffff}, "0228b4abb2548a81acf3d5f094b8e87398fbc146779320b4ac54631d7f3693cd49697f6588e7c0cb18c52573b082760127b0a86c8db007814961d9c251d9c6419c61c4b7c208c873dfd0dffb5e0e0f2968dc0da5a2443dbb627b287983c49bb9bd48638e329e98785d3868b43953956e9b18b68016050436dfaa30053540c2692c93f600dd35b83af81dd8df6d4898ca073852806b2015233aa892bc033d4f0a020e7dd14068e9d5f3136551465fb172051145d6e3c0daa6dcf25d82d97866e8adcadddfe6735c4c92fe5ab045faa2811c7f62664061864f2a529f371814145b9ee5c74b1dd973706c37dd17eb1c7a368aac5df839", [[], [], [], [], [], [], [], [], [], []]}, 0xb15) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) pipe(&(0x7f0000000340)={0xffffffffffffffff}) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000380)={0x7, 0x13, 0x11, 0x8, 0x9, 0xea, 0x1, 0x8c, 0x1}) setreuid(r1, r2) pipe2(&(0x7f00000003c0), 0x84000) [ 653.296472] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 653.296477] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 653.296481] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 653.425383] QAT: Invalid ioctl [ 653.437290] BTRFS error (device loop5): superblock checksum mismatch [ 653.455486] QAT: Invalid ioctl [ 653.515438] BTRFS error (device loop5): open_ctree failed [ 653.524552] BTRFS error (device loop5): superblock checksum mismatch [ 653.610441] BTRFS error (device loop5): open_ctree failed [ 653.617759] BTRFS error (device loop5): superblock checksum mismatch [ 653.680575] BTRFS error (device loop5): open_ctree failed [ 653.690453] BTRFS error (device loop5): superblock checksum mismatch 23:26:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xc5e60467220d606e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2ad2fb161d828ec9, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xf71, @empty, 0x7}, {0xa, 0x4e23, 0x3f, @mcast1, 0x81}, r2}}, 0x48) r3 = syz_open_dev$dmmidi(0x0, 0x3, 0x2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)=0xd) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 653.821297] BTRFS error (device loop5): open_ctree failed [ 653.881937] BTRFS error (device loop3): superblock checksum mismatch 23:26:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:47 executing program 2 (fault-call:3 fault-nth:42): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:47 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) mmap(&(0x7f0000c07000/0xc000)=nil, 0xc000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000580)={0x28, 0x0, 0x2711, @reserved}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x10015) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x0, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x440840}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xff4f) setitimer(0x1, &(0x7f00000002c0)={{}, {0x0, 0x2710}}, 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000000100)=0x2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x400000, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000240)='systee]u:object_r:wystemd_logMnf_var_run_t:s0\x00', 0x2e, 0x0) r5 = request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000440)='}}!GPLvmnet1vmnet1nodevcgroup\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r5) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000001c0)={0x0, 0x0, {0x80, 0x100, 0x7, 0xbec}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, 0xffffffffffffffff, &(0x7f0000000480)={r2}) socket$inet_udplite(0x2, 0x2, 0x88) bind$tipc(r0, 0x0, 0x0) 23:26:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xe43, 0x0) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000001c0)={0xc, @local}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x20240) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000100)=""/10) 23:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x7f6af7f3a6c17332, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000280)={@in6={0xa, 0x4e24, 0x1f, @local, 0x1}, {&(0x7f0000000140)=""/208, 0xd0}, &(0x7f0000000240), 0x1}, 0xa0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000340)=0x54, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 653.970097] BTRFS error (device loop3): open_ctree failed [ 653.978027] BTRFS error (device loop1): superblock checksum mismatch [ 654.016579] BTRFS error (device loop1): open_ctree failed [ 654.028178] BTRFS error (device loop5): superblock checksum mismatch [ 654.043344] FAULT_INJECTION: forcing a failure. [ 654.043344] name failslab, interval 1, probability 0, space 0, times 0 [ 654.054631] CPU: 0 PID: 18313 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 654.061722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.071486] Call Trace: [ 654.071498] dump_stack+0x138/0x19c [ 654.071513] should_fail.cold+0x10f/0x159 [ 654.081820] should_failslab+0xdb/0x130 [ 654.081831] __kmalloc+0x71/0x7a0 [ 654.081840] ? mls_compute_context_len+0x3f6/0x5e0 [ 654.081851] ? context_struct_to_string+0x33a/0x630 [ 654.081861] context_struct_to_string+0x33a/0x630 [ 654.081871] ? dump_masked_av_helper+0x90/0x90 [ 654.081883] security_sid_to_context_core+0x18a/0x200 [ 654.081894] security_sid_to_context_force+0x2b/0x40 [ 654.081904] selinux_inode_init_security+0x493/0x700 [ 654.081914] ? selinux_inode_create+0x30/0x30 [ 654.081922] ? kfree+0x20a/0x270 [ 654.081944] security_inode_init_security+0x18d/0x360 [ 654.081955] ? ext4_init_acl+0x1f0/0x1f0 [ 654.081964] ? security_kernel_post_read_file+0xd0/0xd0 [ 654.081971] ? posix_acl_create+0xf5/0x3a0 [ 654.081983] ? ext4_set_acl+0x400/0x400 [ 654.081992] ? lock_downgrade+0x6e0/0x6e0 [ 654.082003] ext4_init_security+0x34/0x40 [ 654.082013] __ext4_new_inode+0x3385/0x4860 [ 654.082032] ? ext4_free_inode+0x1210/0x1210 [ 654.082046] ? dquot_get_next_dqblk+0x160/0x160 [ 654.082062] ext4_mkdir+0x331/0xc20 [ 654.082076] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 654.082086] ? security_inode_mkdir+0xd0/0x110 [ 654.082097] vfs_mkdir+0x3ca/0x610 [ 654.082108] SyS_mkdir+0x1b7/0x200 [ 654.082117] ? SyS_mkdirat+0x210/0x210 [ 654.082126] ? do_syscall_64+0x53/0x640 [ 654.082134] ? SyS_mkdirat+0x210/0x210 23:26:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x200) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 654.082143] do_syscall_64+0x1e8/0x640 [ 654.082151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 654.082165] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 654.082171] RIP: 0033:0x458c47 [ 654.082175] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 654.082183] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 654.082188] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 654.082192] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:26:47 executing program 2 (fault-call:3 fault-nth:43): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 654.082197] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 654.082201] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 654.150209] BTRFS error (device loop5): open_ctree failed [ 654.357197] FAULT_INJECTION: forcing a failure. [ 654.357197] name failslab, interval 1, probability 0, space 0, times 0 [ 654.369078] CPU: 1 PID: 18339 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 654.376172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.385510] Call Trace: [ 654.388082] dump_stack+0x138/0x19c [ 654.391690] should_fail.cold+0x10f/0x159 [ 654.391749] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 654.400779] should_failslab+0xdb/0x130 23:26:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000000)="70cc4d1e5e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 654.404742] kmem_cache_alloc+0x47/0x780 [ 654.409064] __es_insert_extent+0x26c/0xe60 [ 654.409079] ext4_es_insert_extent+0x1f0/0x590 [ 654.409089] ? check_preemption_disabled+0x3c/0x250 [ 654.409101] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 654.409109] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 654.409121] ? ext4_es_find_delayed_extent_range+0x31d/0x960 [ 654.409133] ext4_ext_put_gap_in_cache+0xcb/0x110 [ 654.409142] ? ext4_zeroout_es+0x170/0x170 [ 654.409151] ? ext4_find_extent+0x64c/0x960 [ 654.409166] ext4_ext_map_blocks+0x1d4b/0x4fa0 [ 654.409175] ? save_trace+0x290/0x290 [ 654.409188] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 654.409194] ? __lock_is_held+0xb6/0x140 23:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 654.409208] ? lock_acquire+0x16f/0x430 [ 654.409216] ? ext4_map_blocks+0x402/0x17c0 [ 654.409231] ext4_map_blocks+0xd3c/0x17c0 [ 654.409239] ? __lock_is_held+0xb6/0x140 [ 654.409247] ? check_preemption_disabled+0x3c/0x250 [ 654.409258] ? ext4_issue_zeroout+0x160/0x160 [ 654.409269] ? __brelse+0x50/0x60 [ 654.409282] ext4_getblk+0xac/0x450 [ 654.409293] ? ext4_iomap_begin+0x8a0/0x8a0 [ 654.409302] ? ext4_free_inode+0x1210/0x1210 [ 654.409313] ext4_bread+0x6e/0x1a0 [ 654.409321] ? ext4_getblk+0x450/0x450 [ 654.409334] ext4_append+0x14b/0x360 [ 654.409345] ext4_mkdir+0x531/0xc20 [ 654.409358] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 654.409369] ? security_inode_mkdir+0xd0/0x110 [ 654.409380] vfs_mkdir+0x3ca/0x610 [ 654.409391] SyS_mkdir+0x1b7/0x200 [ 654.409399] ? SyS_mkdirat+0x210/0x210 [ 654.409414] ? do_syscall_64+0x53/0x640 [ 654.409422] ? SyS_mkdirat+0x210/0x210 [ 654.409432] do_syscall_64+0x1e8/0x640 [ 654.409439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 654.409453] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 654.409459] RIP: 0033:0x458c47 [ 654.409464] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 654.409473] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 654.409478] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 654.409482] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 654.409487] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 654.409492] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 654.441849] BTRFS error (device loop3): superblock checksum mismatch 23:26:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:48 executing program 2 (fault-call:3 fault-nth:44): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 654.480468] BTRFS error (device loop3): open_ctree failed [ 654.686926] BTRFS error (device loop1): superblock checksum mismatch [ 654.750743] BTRFS error (device loop1): open_ctree failed [ 654.758769] BTRFS error (device loop5): superblock checksum mismatch 23:26:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 654.798246] FAULT_INJECTION: forcing a failure. [ 654.798246] name failslab, interval 1, probability 0, space 0, times 0 [ 654.830528] CPU: 0 PID: 18367 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 654.837626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.846968] Call Trace: [ 654.849546] dump_stack+0x138/0x19c [ 654.853168] should_fail.cold+0x10f/0x159 [ 654.857309] should_failslab+0xdb/0x130 [ 654.861272] __kmalloc+0x2f0/0x7a0 [ 654.864799] ? check_preemption_disabled+0x3c/0x250 [ 654.869804] ? ext4_find_extent+0x709/0x960 [ 654.874113] ext4_find_extent+0x709/0x960 [ 654.878248] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 654.883684] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 654.888165] ? save_trace+0x290/0x290 [ 654.891959] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 654.896957] ? __lock_is_held+0xb6/0x140 [ 654.901036] ? lock_acquire+0x16f/0x430 [ 654.904996] ? ext4_map_blocks+0x829/0x17c0 [ 654.909311] ext4_map_blocks+0x881/0x17c0 [ 654.913449] ? ext4_issue_zeroout+0x160/0x160 [ 654.917927] ? __brelse+0x50/0x60 [ 654.921372] ext4_getblk+0xac/0x450 [ 654.924985] ? ext4_iomap_begin+0x8a0/0x8a0 [ 654.929292] ? ext4_free_inode+0x1210/0x1210 [ 654.933686] ext4_bread+0x6e/0x1a0 [ 654.937209] ? ext4_getblk+0x450/0x450 [ 654.941087] ext4_append+0x14b/0x360 [ 654.944785] ext4_mkdir+0x531/0xc20 [ 654.948404] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 654.953065] ? security_inode_mkdir+0xd0/0x110 [ 654.957635] vfs_mkdir+0x3ca/0x610 [ 654.961175] SyS_mkdir+0x1b7/0x200 [ 654.964701] ? SyS_mkdirat+0x210/0x210 [ 654.968573] ? do_syscall_64+0x53/0x640 [ 654.972534] ? SyS_mkdirat+0x210/0x210 [ 654.976415] do_syscall_64+0x1e8/0x640 [ 654.980285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 654.985119] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 654.990290] RIP: 0033:0x458c47 [ 654.993461] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 655.001152] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 655.008403] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 655.015654] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 655.022926] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 655.030178] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:48 executing program 2 (fault-call:3 fault-nth:45): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 655.070840] BTRFS error (device loop5): open_ctree failed [ 655.099352] BTRFS error (device loop3): superblock checksum mismatch 23:26:48 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) mmap(&(0x7f0000c07000/0xc000)=nil, 0xc000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000580)={0x28, 0x0, 0x2711, @reserved}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x10015) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x0, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x440840}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xff4f) setitimer(0x1, &(0x7f00000002c0)={{}, {0x0, 0x2710}}, 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000000100)=0x2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x400000, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000240)='systee]u:object_r:wystemd_logMnf_var_run_t:s0\x00', 0x2e, 0x0) r5 = request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000440)='}}!GPLvmnet1vmnet1nodevcgroup\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r5) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000001c0)={0x0, 0x0, {0x80, 0x100, 0x7, 0xbec}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, 0xffffffffffffffff, &(0x7f0000000480)={r2}) socket$inet_udplite(0x2, 0x2, 0x88) bind$tipc(r0, 0x0, 0x0) 23:26:48 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000100)={0x4, 0xfb}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaae55, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="2fdca5055e0bcfe47bf070e6bb3028ec825eade2a0dca324178e376ec37858bc7b19689df8301332a19055f24cf5988f7f33bd3c67f091082052bd2e1439e28b55914e1a697d98550a00") syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x20, 0x101000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r2, 0x800, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 655.200277] BTRFS error (device loop3): open_ctree failed [ 655.244538] FAULT_INJECTION: forcing a failure. [ 655.244538] name failslab, interval 1, probability 0, space 0, times 0 [ 655.277382] BTRFS error (device loop5): superblock checksum mismatch [ 655.321907] CPU: 0 PID: 18386 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 655.329003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.329008] Call Trace: [ 655.329022] dump_stack+0x138/0x19c [ 655.329038] should_fail.cold+0x10f/0x159 [ 655.329051] should_failslab+0xdb/0x130 [ 655.348665] kmem_cache_alloc+0x2d7/0x780 [ 655.348677] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.348688] ? __mark_inode_dirty+0x2b7/0x1040 [ 655.348702] ext4_mb_new_blocks+0x509/0x3990 [ 655.356768] ? ext4_find_extent+0x709/0x960 [ 655.356788] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 655.356802] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 655.356811] ? __lock_is_held+0xb6/0x140 [ 655.388578] ? lock_acquire+0x16f/0x430 [ 655.392528] ext4_map_blocks+0x881/0x17c0 [ 655.396652] ? ext4_issue_zeroout+0x160/0x160 [ 655.401119] ? __brelse+0x50/0x60 [ 655.404547] ext4_getblk+0xac/0x450 [ 655.408143] ? ext4_iomap_begin+0x8a0/0x8a0 [ 655.412436] ? ext4_free_inode+0x1210/0x1210 [ 655.416821] ext4_bread+0x6e/0x1a0 [ 655.420333] ? ext4_getblk+0x450/0x450 [ 655.424195] ext4_append+0x14b/0x360 [ 655.427880] ext4_mkdir+0x531/0xc20 [ 655.431481] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 655.436126] ? security_inode_mkdir+0xd0/0x110 [ 655.440681] vfs_mkdir+0x3ca/0x610 [ 655.444195] SyS_mkdir+0x1b7/0x200 [ 655.447704] ? SyS_mkdirat+0x210/0x210 [ 655.451563] ? do_syscall_64+0x53/0x640 [ 655.455508] ? SyS_mkdirat+0x210/0x210 [ 655.459383] do_syscall_64+0x1e8/0x640 [ 655.463244] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 655.468062] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 655.473220] RIP: 0033:0x458c47 [ 655.476380] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 655.484059] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 655.491300] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 655.498540] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 655.505781] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 655.513023] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:48 executing program 3: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x490200) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 655.540173] BTRFS error (device loop5): open_ctree failed [ 655.549321] BTRFS error (device loop1): superblock checksum mismatch 23:26:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 655.610168] BTRFS error (device loop1): open_ctree failed [ 655.643573] BTRFS error (device loop5): superblock checksum mismatch 23:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000440)=0x6) ioctl(r0, 0x1000008912, &(0x7f0000000480)="11dc700000000000000000") syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="77f6de04507114096fdd1fab4ed47ccd008e9993f0ed14bf90d977d57333b0daf89c3066f72c03d7aa76d12dde29acce3af92cab09a3d64378fb642de811493a3d373862108e22a779fae9a5076d117e080eb277017f981f3db93450bb68120073db87a3c5c74f3f20df2cffc2df7da89c677b00ee6835ee3a7bcb99648ef8", 0x0, 0x7fff}, {&(0x7f0000000180)="1f9af24542aa429da43ba3cbb9f27437b66705e3acf62250e15719ce36d8b1f4b504b06ea69adffb1aaccf51f95a50492505ce1927d4bb99da8a8e338ec05c10989551a0a5a25ba58d8fd6aca1ef17071f71e2e9d472819c42623288d5422fe978b92d33e11e27dcb970bd3e432fa86e7e94b4a39910f5027dd4145695063b598319749dedcd853359ef5dc7b11b4ff4efe2396c3e4d2f2d13fa301bb070507b00f25fc600c5d2e7f20db08b04ddf34ef584ea41", 0x3b5, 0x1f}, {&(0x7f0000000240)="b601ce7d6f831656c43289a4f88a85a8f5d2722eb125413ef575a37272c2d3d88b70d1272368c79708745363173cea9fd30ededdd9ab", 0x0, 0x1}, {&(0x7f0000000280)="e54813eeebf5b90d4b496e3d37a264c464fcc29db493915e4fa0cf94c2b35f263afaaf2d7dd9e085767a20bcd444ef1183e45c2f81fe01001b3a8831b710e34d51ce07820ce554f25197edcd9c7e52f51b4f34d65246fb5b8d9a0980f4bd8218ac685c21e47745903e", 0x0, 0x100000000}, {&(0x7f0000000300)="2d2555ef5c2bfc4cea64b40e1151accf2bfe220fa4205e50f67eb02cfb43c7bcfc2587cba6eddf6cc88d25d4479c", 0x7, 0x3bcd}, {&(0x7f0000000340)="fb2149c7d2c839f7197de9931099d55b207c0555", 0x0, 0x9b}], 0x82f53, 0x0) [ 655.720702] BTRFS error (device loop5): open_ctree failed [ 655.728351] BTRFS error (device loop5): superblock checksum mismatch 23:26:49 executing program 2 (fault-call:3 fault-nth:46): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 655.770403] BTRFS error (device loop5): open_ctree failed [ 655.783318] BTRFS error (device loop5): superblock checksum mismatch [ 655.809426] QAT: Invalid ioctl 23:26:49 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) mmap(&(0x7f0000c07000/0xc000)=nil, 0xc000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000580)={0x28, 0x0, 0x2711, @reserved}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x10015) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x0, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x440840}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xff4f) setitimer(0x1, &(0x7f00000002c0)={{}, {0x0, 0x2710}}, 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000000100)=0x2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x400000, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000240)='systee]u:object_r:wystemd_logMnf_var_run_t:s0\x00', 0x2e, 0x0) r5 = request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000440)='}}!GPLvmnet1vmnet1nodevcgroup\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r5) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000001c0)={0x0, 0x0, {0x80, 0x100, 0x7, 0xbec}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, 0xffffffffffffffff, &(0x7f0000000480)={r2}) socket$inet_udplite(0x2, 0x2, 0x88) bind$tipc(r0, 0x0, 0x0) 23:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 655.873368] FAULT_INJECTION: forcing a failure. [ 655.873368] name failslab, interval 1, probability 0, space 0, times 0 [ 655.893907] BTRFS error (device loop5): open_ctree failed [ 655.894924] CPU: 1 PID: 18444 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 655.906523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.915862] Call Trace: [ 655.918442] dump_stack+0x138/0x19c [ 655.922066] should_fail.cold+0x10f/0x159 [ 655.926213] should_failslab+0xdb/0x130 [ 655.930177] kmem_cache_alloc+0x2d7/0x780 [ 655.934313] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.939317] ? __mark_inode_dirty+0x2b7/0x1040 [ 655.944284] ext4_mb_new_blocks+0x509/0x3990 [ 655.944296] ? ext4_find_extent+0x709/0x960 [ 655.944313] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 655.957567] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 655.957577] ? __lock_is_held+0xb6/0x140 [ 655.957591] ? lock_acquire+0x16f/0x430 [ 655.957609] ext4_map_blocks+0x881/0x17c0 [ 655.957623] ? ext4_issue_zeroout+0x160/0x160 [ 655.957633] ? __brelse+0x50/0x60 [ 655.957646] ext4_getblk+0xac/0x450 [ 655.957655] ? ext4_iomap_begin+0x8a0/0x8a0 [ 655.957666] ? ext4_free_inode+0x1210/0x1210 [ 655.957676] ext4_bread+0x6e/0x1a0 [ 655.957685] ? ext4_getblk+0x450/0x450 [ 655.957697] ext4_append+0x14b/0x360 [ 655.957708] ext4_mkdir+0x531/0xc20 [ 655.957721] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 655.957733] ? security_inode_mkdir+0xd0/0x110 [ 655.957744] vfs_mkdir+0x3ca/0x610 [ 655.957755] SyS_mkdir+0x1b7/0x200 [ 655.957763] ? SyS_mkdirat+0x210/0x210 [ 655.957771] ? do_syscall_64+0x53/0x640 [ 655.957780] ? SyS_mkdirat+0x210/0x210 [ 655.957789] do_syscall_64+0x1e8/0x640 [ 655.957797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 655.957810] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 655.957817] RIP: 0033:0x458c47 [ 655.957821] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 655.957830] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 655.957834] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 655.957839] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 655.957843] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 655.957848] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 656.146701] QAT: Invalid ioctl 23:26:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x8000, 0x203, 0xfffffffffffffff8, 0xa6, r2}, &(0x7f0000000180)=0x10) 23:26:49 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ptrace$pokeuser(0x6, r0, 0x9c, 0x9) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:49 executing program 2 (fault-call:3 fault-nth:47): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:49 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1c000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x800, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x400, @bearer=@udp='udp:syz2\x00'}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getpeername(r2, &(0x7f0000000100)=@nfc, &(0x7f0000000180)=0x80) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0xb208c21ff9ba20f0, 0x0) fcntl$setpipe(r2, 0x407, 0xff) [ 656.238026] FAULT_INJECTION: forcing a failure. [ 656.238026] name failslab, interval 1, probability 0, space 0, times 0 23:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 656.287267] BTRFS error (device loop5): superblock checksum mismatch [ 656.319475] CPU: 1 PID: 18469 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 656.326573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.335917] Call Trace: [ 656.338495] dump_stack+0x138/0x19c [ 656.342118] should_fail.cold+0x10f/0x159 [ 656.346257] should_failslab+0xdb/0x130 [ 656.350221] kmem_cache_alloc+0x2d7/0x780 [ 656.354365] ? rcu_read_lock_sched_held+0x110/0x130 [ 656.359373] ? __mark_inode_dirty+0x2b7/0x1040 [ 656.363950] ext4_mb_new_blocks+0x509/0x3990 [ 656.368359] ? ext4_find_extent+0x709/0x960 23:26:49 executing program 2 (fault-call:3 fault-nth:48): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 656.368379] ext4_ext_map_blocks+0x26cd/0x4fa0 23:26:49 executing program 5: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000140)={{0x77359400}, {r0, r1/1000+30000}}, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x2440c1, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f00000003c0)) r3 = perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000001c0)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$caif_stream(0x25, 0x1, 0x4) connect(r5, &(0x7f0000000200)=@pptp={0x18, 0x2, {0x2, @broadcast}}, 0x80) syz_mount_image$btrfs(&(0x7f0000000400)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xffffffffffffffa2, 0x10000}], 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000340)) [ 656.368395] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 656.368403] ? __lock_is_held+0xb6/0x140 [ 656.368417] ? lock_acquire+0x16f/0x430 [ 656.368434] ext4_map_blocks+0x881/0x17c0 [ 656.368449] ? ext4_issue_zeroout+0x160/0x160 [ 656.368458] ? __brelse+0x50/0x60 [ 656.368472] ext4_getblk+0xac/0x450 [ 656.368482] ? ext4_iomap_begin+0x8a0/0x8a0 [ 656.368492] ? ext4_free_inode+0x1210/0x1210 [ 656.368503] ext4_bread+0x6e/0x1a0 [ 656.368512] ? ext4_getblk+0x450/0x450 [ 656.368525] ext4_append+0x14b/0x360 23:26:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 656.368535] ext4_mkdir+0x531/0xc20 [ 656.368549] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 656.368560] ? security_inode_mkdir+0xd0/0x110 [ 656.368572] vfs_mkdir+0x3ca/0x610 [ 656.368584] SyS_mkdir+0x1b7/0x200 [ 656.368592] ? SyS_mkdirat+0x210/0x210 [ 656.368601] ? do_syscall_64+0x53/0x640 [ 656.368609] ? SyS_mkdirat+0x210/0x210 [ 656.368619] do_syscall_64+0x1e8/0x640 [ 656.368626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.368640] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 656.368647] RIP: 0033:0x458c47 [ 656.368651] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 656.368661] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000458c47 [ 656.368665] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 656.368670] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 656.368675] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 656.368679] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 656.404896] BTRFS error (device loop5): open_ctree failed [ 656.406747] BTRFS error (device loop5): superblock checksum mismatch [ 656.472366] BTRFS error (device loop5): open_ctree failed [ 656.474120] BTRFS error (device loop5): superblock checksum mismatch [ 656.521335] FAULT_INJECTION: forcing a failure. [ 656.521335] name failslab, interval 1, probability 0, space 0, times 0 [ 656.521344] CPU: 0 PID: 18498 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 656.521349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.521352] Call Trace: [ 656.521364] dump_stack+0x138/0x19c 23:26:50 executing program 2 (fault-call:3 fault-nth:49): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:50 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) [ 656.521378] should_fail.cold+0x10f/0x159 [ 656.521391] should_failslab+0xdb/0x130 [ 656.521402] __kmalloc_track_caller+0x2ec/0x790 [ 656.521414] ? strndup_user+0x62/0xf0 [ 656.521423] memdup_user+0x26/0xa0 [ 656.521432] strndup_user+0x62/0xf0 [ 656.521443] SyS_mount+0x3c/0x120 [ 656.521451] ? copy_mnt_ns+0x8c0/0x8c0 [ 656.521462] do_syscall_64+0x1e8/0x640 [ 656.521469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.521483] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 656.521489] RIP: 0033:0x45c27a [ 656.521494] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 656.521503] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 656.521508] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 656.521513] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 656.521518] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 656.521523] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 656.521655] BTRFS error (device loop5): open_ctree failed 23:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0xfffffffffffffffe, 0x8, {0x7, 0x1f, 0x4, 0x20, 0x1, 0x8000, 0x1, 0x3}}, 0x50) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 656.539915] BTRFS error (device loop3): superblock checksum mismatch [ 656.690734] BTRFS error (device loop3): open_ctree failed [ 656.907076] FAULT_INJECTION: forcing a failure. [ 656.907076] name failslab, interval 1, probability 0, space 0, times 0 [ 656.933851] BTRFS error (device loop5): superblock checksum mismatch [ 656.944926] CPU: 0 PID: 18521 Comm: syz-executor.2 Not tainted 4.14.139 #35 23:26:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f00000000c0)={0x4, 0x1, @stop_pts=0x1}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:50 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) 23:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 656.952104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.952109] Call Trace: [ 656.952124] dump_stack+0x138/0x19c [ 656.952140] should_fail.cold+0x10f/0x159 [ 656.952155] should_failslab+0xdb/0x130 [ 656.952166] __kmalloc_track_caller+0x2ec/0x790 [ 656.952176] ? kasan_check_write+0x14/0x20 [ 656.952184] ? strndup_user+0x62/0xf0 [ 656.952194] memdup_user+0x26/0xa0 [ 656.952203] strndup_user+0x62/0xf0 [ 656.952213] SyS_mount+0x6b/0x120 [ 656.952221] ? copy_mnt_ns+0x8c0/0x8c0 [ 656.952235] do_syscall_64+0x1e8/0x640 [ 656.967731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.967744] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 656.967752] RIP: 0033:0x45c27a [ 656.975820] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 656.975830] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 656.975835] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 656.975839] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 656.975845] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 23:26:50 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000940)={{0x8, 0x6, 0x1, 0x6, 'syz1\x00', 0x5}, 0x0, [0x0, 0x2, 0x10001, 0x9b, 0x0, 0x7, 0x7ff, 0x7fff, 0x99, 0x9, 0x101, 0x6, 0x5, 0x2, 0x9, 0x6, 0x2, 0xc697, 0x9, 0x39009d27, 0x40, 0x0, 0x5, 0x2, 0x7ff, 0x6, 0x101, 0x40, 0x2b0, 0x5, 0x7, 0x9, 0xfff, 0x1ff, 0x9, 0x2, 0x2, 0x7, 0x401, 0x3, 0x9, 0x800, 0x7, 0x5, 0x3f, 0x29, 0x989, 0x8, 0x80000001, 0x7, 0x7f, 0x20, 0x63, 0xfffffffffffffe01, 0x9, 0x0, 0x1ff, 0x9, 0x8, 0xfff, 0x7, 0x80000000, 0x5, 0x77b, 0x5f9728cf, 0x2, 0x7, 0x7fff, 0x8, 0x704d, 0x6, 0xf72, 0x8000000000, 0x5, 0x6, 0x5, 0x0, 0x4, 0x2, 0x400, 0xffff, 0x1e22, 0x80000000, 0x39dd08d6, 0x30000000, 0x2, 0x6, 0x4, 0x7, 0xe000000000000000, 0x400, 0x4, 0x1000, 0x7, 0x4, 0x3ff, 0x7, 0x0, 0x800, 0x6, 0xc51d, 0x26d, 0x8, 0x800, 0xaaa, 0x101, 0x8, 0x80000001, 0x8, 0xa7, 0x2, 0x8001, 0x4, 0x2, 0x101, 0x20000000000000, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x1, 0x7ff, 0x9, 0x0, 0x8, 0x2, 0x8], {0x77359400}}) 23:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 657.011547] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 657.085822] BTRFS error (device loop5): open_ctree failed 23:26:50 executing program 2 (fault-call:3 fault-nth:50): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 657.109130] BTRFS error (device loop1): superblock checksum mismatch 23:26:50 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0xfffffffffffffffe, 0x8, {0x7, 0x1f, 0x4, 0x20, 0x1, 0x8000, 0x1, 0x3}}, 0x50) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 657.175244] FAULT_INJECTION: forcing a failure. [ 657.175244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 657.187040] CPU: 0 PID: 18551 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 657.194129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.203472] Call Trace: [ 657.206049] dump_stack+0x138/0x19c [ 657.209678] should_fail.cold+0x10f/0x159 [ 657.213818] __alloc_pages_nodemask+0x1d6/0x7a0 [ 657.213827] ? fs_reclaim_acquire+0x20/0x20 23:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 657.213838] ? __alloc_pages_slowpath+0x2930/0x2930 [ 657.213856] cache_grow_begin+0x80/0x400 [ 657.222797] kmem_cache_alloc_trace+0x6b2/0x790 [ 657.222807] ? kasan_check_write+0x14/0x20 [ 657.222821] copy_mount_options+0x5c/0x2f0 [ 657.222833] SyS_mount+0x87/0x120 [ 657.222840] ? copy_mnt_ns+0x8c0/0x8c0 [ 657.222851] do_syscall_64+0x1e8/0x640 [ 657.222859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 657.240744] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 657.240752] RIP: 0033:0x45c27a 23:26:50 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x83a2b68a2b951522, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x1) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(0x0, 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 657.240757] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 657.240766] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 657.240771] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 657.240776] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 657.240780] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 657.240784] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 657.252457] BTRFS error (device loop1): open_ctree failed [ 657.350117] BTRFS error (device loop3): superblock checksum mismatch 23:26:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x7fff, 0x3, [0x2, 0x5, 0xffff]}, &(0x7f0000000100)=0xe) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0x24b8d984, 0x100000001, 0x9}, 0x10) [ 657.400711] BTRFS error (device loop3): open_ctree failed [ 657.411347] BTRFS error (device loop3): superblock checksum mismatch [ 657.480142] BTRFS error (device loop3): open_ctree failed [ 657.490281] BTRFS error (device loop3): superblock checksum mismatch 23:26:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f00000000c0)={0x5, 0xf87624e82bcbb308, "21b2380e5d7c5caa49c99737db9aef53bf7943cee093d461", {0x0, 0xfffffffffffff22e}, 0x1}) 23:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(0x0, 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:50 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:50 executing program 2 (fault-call:3 fault-nth:51): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 657.550207] BTRFS error (device loop3): open_ctree failed [ 657.576447] BTRFS error (device loop3): superblock checksum mismatch 23:26:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0xfffffffffffffffe, 0x8, {0x7, 0x1f, 0x4, 0x20, 0x1, 0x8000, 0x1, 0x3}}, 0x50) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(0x0, 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:50 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_ivalue=0x3}) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000340)=0x6) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 657.600133] net_ratelimit: 25 callbacks suppressed [ 657.600138] protocol 88fb is buggy, dev hsr_slave_0 [ 657.610534] protocol 88fb is buggy, dev hsr_slave_1 [ 657.610613] protocol 88fb is buggy, dev hsr_slave_0 [ 657.610646] protocol 88fb is buggy, dev hsr_slave_1 23:26:51 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 657.680077] protocol 88fb is buggy, dev hsr_slave_0 [ 657.680105] protocol 88fb is buggy, dev hsr_slave_1 [ 657.685141] protocol 88fb is buggy, dev hsr_slave_1 [ 657.698752] BTRFS error (device loop3): open_ctree failed 23:26:51 executing program 3: syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f, 0xaaaaaaaaaaaa8de, &(0x7f0000000200)=[{&(0x7f0000000100)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xffffffffffffffd5, 0x9}], 0xf43, 0x0) [ 657.732438] FAULT_INJECTION: forcing a failure. [ 657.732438] name failslab, interval 1, probability 0, space 0, times 0 [ 657.749036] BTRFS error (device loop1): superblock checksum mismatch [ 657.791624] CPU: 1 PID: 18597 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 657.798720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.808051] Call Trace: [ 657.810622] dump_stack+0x138/0x19c [ 657.814225] should_fail.cold+0x10f/0x159 [ 657.818351] should_failslab+0xdb/0x130 [ 657.822297] kmem_cache_alloc_trace+0x2e9/0x790 [ 657.826938] ? kasan_check_write+0x14/0x20 [ 657.831146] ? _copy_from_user+0x99/0x110 [ 657.835266] copy_mount_options+0x5c/0x2f0 [ 657.839476] SyS_mount+0x87/0x120 [ 657.842902] ? copy_mnt_ns+0x8c0/0x8c0 [ 657.847005] do_syscall_64+0x1e8/0x640 [ 657.850863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 657.855679] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 657.860840] RIP: 0033:0x45c27a [ 657.864000] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 657.871680] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 657.878918] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 23:26:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 657.886159] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 657.893398] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 657.900642] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 657.920961] BTRFS error (device loop1): open_ctree failed 23:26:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000000c0)=0x4) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:51 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 2 (fault-call:3 fault-nth:52): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 658.077217] FAULT_INJECTION: forcing a failure. [ 658.077217] name failslab, interval 1, probability 0, space 0, times 0 [ 658.088681] protocol 88fb is buggy, dev hsr_slave_0 [ 658.088725] protocol 88fb is buggy, dev hsr_slave_1 [ 658.088816] protocol 88fb is buggy, dev hsr_slave_0 [ 658.109432] BTRFS error (device loop5): superblock checksum mismatch [ 658.125384] CPU: 1 PID: 18640 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 658.132483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.141826] Call Trace: [ 658.144407] dump_stack+0x138/0x19c [ 658.148031] should_fail.cold+0x10f/0x159 [ 658.152171] should_failslab+0xdb/0x130 [ 658.156132] kmem_cache_alloc+0x2d7/0x780 [ 658.160257] ? lock_downgrade+0x6e0/0x6e0 [ 658.164383] alloc_vfsmnt+0x28/0x7d0 [ 658.168069] vfs_kern_mount.part.0+0x2a/0x3d0 [ 658.172539] do_mount+0x417/0x27d0 [ 658.176053] ? retint_kernel+0x2d/0x2d [ 658.179918] ? copy_mount_string+0x40/0x40 [ 658.184123] ? copy_mount_options+0x195/0x2f0 [ 658.188592] ? copy_mount_options+0x1fe/0x2f0 [ 658.193065] SyS_mount+0xab/0x120 [ 658.196487] ? copy_mnt_ns+0x8c0/0x8c0 [ 658.200346] do_syscall_64+0x1e8/0x640 [ 658.204205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 658.209022] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 658.214180] RIP: 0033:0x45c27a [ 658.217340] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 658.225020] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 658.232259] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 658.239502] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 658.246750] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 658.253991] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:51 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 2 (fault-call:3 fault-nth:53): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 658.285777] BTRFS error (device loop5): open_ctree failed [ 658.293267] BTRFS error (device loop5): superblock checksum mismatch 23:26:51 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x2002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_mount_image$btrfs(&(0x7f0000000340)='btrfs\x00', &(0x7f0000000380)='./file0/file0\x00', 0x7, 0x2, &(0x7f0000000440)=[{&(0x7f0000000940)="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", 0x1000, 0x81}, {&(0x7f00000003c0)="e3198ef1ae79c9a227859236b6977418e243ef78ddf7be0c047235a796e5ee8dc1fa67f016b68197b28d5d1512755445d16cf73ce8ff2c3c4de5ac5574aaa6096eaccbe869b3207b3abb4b9a98eb", 0x4e, 0x4}], 0x80, &(0x7f0000000580)=ANY=[@ANYBLOB="6e6f626172726965722c636f6d70726573732c73706163655f63616368653d76312c6e3806038cbd6f61636c2c636865636b5f696e743d307866666666666666666666666666666600000000007b343ca0f85da5e5981564c78a2bbb0ef195003dc2575a4b2f558c702d09d93a76503e0c787a98a019ae99244ec4a79a6fe9c3123cc8e0eaff28dce2c9756e7738c15efc3de87b0fa8f6c1ffaa6182045e9c77d502bc24678f7e68774af1ee06d38c39e122077aafa66cd672f60d34df01f0e7405e8fcb7eeab5ce78ff9c3e08"]) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000100)={0x5c, 0x7, 0x38d5, 0x7, 0x5, 0x6}) write(r0, &(0x7f00000001c0)="a17948cd3045c643241852104e51d9f1218f0cab0fce1bd8bb4bcb195d05f2c7b9849e8e4da9190d57516ba067f183dec4187a036a6bfaced54e2b1cee3aa18367af19d297a49c737c18f900f4951bacbaba397612b3f42a7ea7c330f8f03972d9b6043e9a84b8", 0x67) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r3 = getpid() tkill(r3, 0x2b) ppoll(&(0x7f0000000240)=[{r0, 0x328}], 0x1, &(0x7f00000002c0)={r1, r2+10000000}, &(0x7f0000000300)={0xbb}, 0x8) [ 658.384434] FAULT_INJECTION: forcing a failure. [ 658.384434] name failslab, interval 1, probability 0, space 0, times 0 [ 658.402148] BTRFS error (device loop5): open_ctree failed 23:26:51 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 658.476494] BTRFS error (device loop5): superblock checksum mismatch [ 658.491113] CPU: 1 PID: 18658 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 658.498212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.507552] Call Trace: [ 658.510132] dump_stack+0x138/0x19c [ 658.513931] should_fail.cold+0x10f/0x159 [ 658.518074] should_failslab+0xdb/0x130 [ 658.522031] kmem_cache_alloc+0x2d7/0x780 [ 658.526157] ? lock_downgrade+0x6e0/0x6e0 [ 658.530281] alloc_vfsmnt+0x28/0x7d0 [ 658.533969] vfs_kern_mount.part.0+0x2a/0x3d0 [ 658.538439] do_mount+0x417/0x27d0 [ 658.541954] ? copy_mount_options+0x5c/0x2f0 [ 658.546337] ? rcu_read_lock_sched_held+0x110/0x130 [ 658.551324] ? copy_mount_string+0x40/0x40 [ 658.555536] ? copy_mount_options+0x1fe/0x2f0 [ 658.560003] SyS_mount+0xab/0x120 [ 658.563434] ? copy_mnt_ns+0x8c0/0x8c0 [ 658.567296] do_syscall_64+0x1e8/0x640 [ 658.571156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 658.575974] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 658.581133] RIP: 0033:0x45c27a [ 658.584292] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 658.591971] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 658.599214] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 658.606456] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 658.614044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 658.621283] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 658.660278] BTRFS error (device loop5): open_ctree failed [ 658.667601] BTRFS error (device loop5): superblock checksum mismatch [ 658.710176] BTRFS error (device loop5): open_ctree failed [ 658.718835] BTRFS error (device loop5): superblock checksum mismatch 23:26:52 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:52 executing program 2 (fault-call:3 fault-nth:54): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x4800) 23:26:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getegid() fchown(r1, r2, r3) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:52 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 658.820075] BTRFS error (device loop5): open_ctree failed [ 658.883389] FAULT_INJECTION: forcing a failure. [ 658.883389] name failslab, interval 1, probability 0, space 0, times 0 [ 658.894908] CPU: 1 PID: 18698 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 658.902004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.902008] Call Trace: [ 658.902027] dump_stack+0x138/0x19c [ 658.917700] should_fail.cold+0x10f/0x159 [ 658.917714] should_failslab+0xdb/0x130 [ 658.917724] kmem_cache_alloc+0x2d7/0x780 [ 658.917736] ? lock_downgrade+0x6e0/0x6e0 [ 658.917748] alloc_vfsmnt+0x28/0x7d0 [ 658.925822] vfs_kern_mount.part.0+0x2a/0x3d0 [ 658.925835] do_mount+0x417/0x27d0 [ 658.925844] ? copy_mount_options+0x5c/0x2f0 [ 658.925855] ? rcu_read_lock_sched_held+0x110/0x130 [ 658.925863] ? copy_mount_string+0x40/0x40 [ 658.925874] ? copy_mount_options+0x1fe/0x2f0 [ 658.934124] SyS_mount+0xab/0x120 [ 658.934133] ? copy_mnt_ns+0x8c0/0x8c0 [ 658.934146] do_syscall_64+0x1e8/0x640 [ 658.934154] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:52 executing program 2 (fault-call:3 fault-nth:55): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:52 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 658.934169] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 658.942319] RIP: 0033:0x45c27a [ 658.942324] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 658.942333] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 658.942338] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 658.942343] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 658.942347] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 658.942352] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 659.067491] BTRFS error (device loop5): superblock checksum mismatch [ 659.115879] FAULT_INJECTION: forcing a failure. [ 659.115879] name failslab, interval 1, probability 0, space 0, times 0 [ 659.133797] CPU: 0 PID: 18723 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 659.133804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.133807] Call Trace: [ 659.133820] dump_stack+0x138/0x19c [ 659.133835] should_fail.cold+0x10f/0x159 [ 659.133849] should_failslab+0xdb/0x130 [ 659.133861] __kmalloc_track_caller+0x2ec/0x790 [ 659.133873] ? kstrdup_const+0x48/0x60 [ 659.133883] kstrdup+0x3a/0x70 [ 659.133893] kstrdup_const+0x48/0x60 [ 659.133904] alloc_vfsmnt+0xe5/0x7d0 [ 659.133915] vfs_kern_mount.part.0+0x2a/0x3d0 [ 659.133926] do_mount+0x417/0x27d0 [ 659.133935] ? copy_mount_options+0x5c/0x2f0 [ 659.133944] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.133956] ? copy_mount_string+0x40/0x40 [ 659.133969] ? copy_mount_options+0x1fe/0x2f0 [ 659.133980] SyS_mount+0xab/0x120 [ 659.133988] ? copy_mnt_ns+0x8c0/0x8c0 [ 659.133998] do_syscall_64+0x1e8/0x640 [ 659.134005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 659.134019] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 659.134025] RIP: 0033:0x45c27a [ 659.134030] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 659.134040] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 659.134046] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 659.134050] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 23:26:52 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:52 executing program 2 (fault-call:3 fault-nth:56): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 659.134054] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 659.134059] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 659.142065] BTRFS error (device loop5): open_ctree failed 23:26:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:52 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 659.382210] FAULT_INJECTION: forcing a failure. [ 659.382210] name failslab, interval 1, probability 0, space 0, times 0 [ 659.394529] CPU: 0 PID: 18742 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 659.401625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.401630] Call Trace: [ 659.401645] dump_stack+0x138/0x19c [ 659.401661] should_fail.cold+0x10f/0x159 [ 659.401676] should_failslab+0xdb/0x130 [ 659.401686] kmem_cache_alloc+0x2d7/0x780 [ 659.401697] ? check_preemption_disabled+0x3c/0x250 [ 659.413590] alloc_vfsmnt+0x28/0x7d0 [ 659.413602] vfs_kern_mount.part.0+0x2a/0x3d0 [ 659.413611] ? find_held_lock+0x35/0x130 [ 659.413622] vfs_kern_mount+0x40/0x60 [ 659.413633] btrfs_mount+0x3ce/0x2b14 [ 659.454068] ? lock_downgrade+0x6e0/0x6e0 [ 659.458187] ? find_held_lock+0x35/0x130 [ 659.462221] ? pcpu_alloc+0x3af/0x1050 [ 659.466086] ? btrfs_remount+0x11f0/0x11f0 [ 659.470294] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.475286] ? __lockdep_init_map+0x10c/0x570 [ 659.479752] ? __lockdep_init_map+0x10c/0x570 [ 659.484220] mount_fs+0x97/0x2a1 [ 659.487561] vfs_kern_mount.part.0+0x5e/0x3d0 [ 659.492028] do_mount+0x417/0x27d0 [ 659.495541] ? copy_mount_options+0x5c/0x2f0 [ 659.499921] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.504910] ? copy_mount_string+0x40/0x40 [ 659.509118] ? copy_mount_options+0x1fe/0x2f0 [ 659.513584] SyS_mount+0xab/0x120 [ 659.517008] ? copy_mnt_ns+0x8c0/0x8c0 [ 659.520868] do_syscall_64+0x1e8/0x640 [ 659.524725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 659.529544] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 659.534704] RIP: 0033:0x45c27a [ 659.537869] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 659.545550] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 659.552788] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 659.560030] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 659.567269] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 659.574513] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 659.600558] BTRFS error (device loop5): superblock checksum mismatch [ 659.640269] BTRFS error (device loop5): open_ctree failed [ 659.647491] BTRFS error (device loop5): superblock checksum mismatch [ 659.733103] BTRFS error (device loop5): open_ctree failed [ 659.743226] BTRFS error (device loop3): superblock checksum mismatch 23:26:53 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x111004, 0x0) shutdown(r0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x0, 0x8}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) [ 659.830311] BTRFS error (device loop3): open_ctree failed [ 659.837963] BTRFS error (device loop1): superblock checksum mismatch 23:26:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:53 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:53 executing program 2 (fault-call:3 fault-nth:57): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 659.930110] BTRFS error (device loop1): open_ctree failed [ 659.996660] FAULT_INJECTION: forcing a failure. [ 659.996660] name failslab, interval 1, probability 0, space 0, times 0 [ 660.008443] CPU: 0 PID: 18772 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 660.015686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.025026] Call Trace: [ 660.027606] dump_stack+0x138/0x19c [ 660.031231] should_fail.cold+0x10f/0x159 [ 660.035371] should_failslab+0xdb/0x130 [ 660.035383] __kmalloc_track_caller+0x2ec/0x790 23:26:53 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, 0x0, 0x0) [ 660.035398] ? kstrdup_const+0x48/0x60 [ 660.035407] kstrdup+0x3a/0x70 [ 660.043994] kstrdup_const+0x48/0x60 [ 660.044004] alloc_vfsmnt+0xe5/0x7d0 [ 660.044014] vfs_kern_mount.part.0+0x2a/0x3d0 [ 660.044025] do_mount+0x417/0x27d0 [ 660.066453] ? copy_mount_options+0x5c/0x2f0 [ 660.066465] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.066475] ? copy_mount_string+0x40/0x40 [ 660.066488] ? copy_mount_options+0x1fe/0x2f0 [ 660.084550] SyS_mount+0xab/0x120 [ 660.084559] ? copy_mnt_ns+0x8c0/0x8c0 [ 660.084572] do_syscall_64+0x1e8/0x640 [ 660.084579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 660.084594] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 660.084600] RIP: 0033:0x45c27a [ 660.084604] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.091890] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 660.091895] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 660.091900] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 660.091904] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 23:26:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, 0x0, 0x0) 23:26:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:53 executing program 2 (fault-call:3 fault-nth:58): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 660.091908] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 660.173586] BTRFS error (device loop3): superblock checksum mismatch 23:26:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, 0x0, 0x0) [ 660.232566] FAULT_INJECTION: forcing a failure. [ 660.232566] name failslab, interval 1, probability 0, space 0, times 0 [ 660.252865] BTRFS error (device loop3): open_ctree failed [ 660.263615] BTRFS error (device loop3): superblock checksum mismatch [ 660.278033] CPU: 0 PID: 18801 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 660.285128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.294476] Call Trace: [ 660.297058] dump_stack+0x138/0x19c [ 660.300679] should_fail.cold+0x10f/0x159 [ 660.304824] should_failslab+0xdb/0x130 [ 660.308788] __kmalloc_track_caller+0x2ec/0x790 [ 660.313443] ? unwind_get_return_address+0x61/0xa0 [ 660.313454] ? __save_stack_trace+0x7b/0xd0 [ 660.313464] ? btrfs_parse_early_options+0xa3/0x310 [ 660.313476] kstrdup+0x3a/0x70 [ 660.322674] btrfs_parse_early_options+0xa3/0x310 [ 660.322687] ? save_trace+0x290/0x290 [ 660.322695] ? btrfs_freeze+0xc0/0xc0 [ 660.322706] ? pcpu_alloc+0xcf0/0x1050 [ 660.322714] ? find_held_lock+0x35/0x130 [ 660.322722] ? pcpu_alloc+0xcf0/0x1050 [ 660.322734] btrfs_mount+0x11d/0x2b14 [ 660.358725] ? lock_downgrade+0x6e0/0x6e0 [ 660.362853] ? find_held_lock+0x35/0x130 [ 660.366891] ? pcpu_alloc+0x3af/0x1050 [ 660.370748] ? _find_next_bit+0xee/0x120 [ 660.374785] ? check_preemption_disabled+0x3c/0x250 [ 660.379782] ? btrfs_remount+0x11f0/0x11f0 [ 660.383993] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.388987] ? __lockdep_init_map+0x10c/0x570 [ 660.393453] ? __lockdep_init_map+0x10c/0x570 [ 660.397918] mount_fs+0x97/0x2a1 [ 660.401259] vfs_kern_mount.part.0+0x5e/0x3d0 [ 660.405721] ? find_held_lock+0x35/0x130 [ 660.409753] vfs_kern_mount+0x40/0x60 [ 660.413524] btrfs_mount+0x3ce/0x2b14 [ 660.417298] ? lock_downgrade+0x6e0/0x6e0 [ 660.421413] ? find_held_lock+0x35/0x130 [ 660.425447] ? pcpu_alloc+0x3af/0x1050 [ 660.429309] ? btrfs_remount+0x11f0/0x11f0 [ 660.433521] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.438514] ? __lockdep_init_map+0x10c/0x570 [ 660.442980] ? __lockdep_init_map+0x10c/0x570 [ 660.447535] mount_fs+0x97/0x2a1 [ 660.450883] vfs_kern_mount.part.0+0x5e/0x3d0 [ 660.455362] do_mount+0x417/0x27d0 [ 660.458874] ? copy_mount_options+0x5c/0x2f0 [ 660.463250] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.468244] ? copy_mount_string+0x40/0x40 [ 660.472458] ? copy_mount_options+0x1fe/0x2f0 [ 660.476923] SyS_mount+0xab/0x120 [ 660.480361] ? copy_mnt_ns+0x8c0/0x8c0 [ 660.484218] do_syscall_64+0x1e8/0x640 [ 660.488079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 660.492892] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 660.498048] RIP: 0033:0x45c27a [ 660.501210] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.508885] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 660.516131] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 660.523374] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 660.530613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 660.537858] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 660.560187] BTRFS error (device loop3): open_ctree failed [ 660.567200] BTRFS error (device loop3): superblock checksum mismatch [ 660.623663] BTRFS error (device loop3): open_ctree failed [ 660.632723] BTRFS error (device loop1): superblock checksum mismatch 23:26:54 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40080, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 23:26:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:54 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x2791f9d2126d487d) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xc6, "4f4f1c5c40a844efdc21460841b721444df0075f26fb86a4f653fe92e4a4b5aa1f43b7738cabe470d67b0ac6420a5eff74b3f196260f946388e43b1b7485466af891e3000399d51c84f580eb180bf2ff6de1bf7cc108fe5bdeb1ac61c7ea2ef1dd7a5320d7c75f4cb6f3bb3a70d334af0d486a530fb4272754b51e16e1eb7ff7418862c75a49642f640ed58801e45f4dbe67cb187deb1044b1d568f981edb90cc7b7a8c2aa045db429a1f219cc5c0d3717992804e5b5bdb5199a5fda80319181dbf6b2bbf7b4"}, &(0x7f0000000300)=0xce) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000680)=0xc) ptrace$setsig(0x4203, r1, 0x1, &(0x7f00000006c0)={0x9, 0x2, 0xffffffffffffffff}) r2 = add_key(&(0x7f0000000740)='logon\x00', &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$get_security(0x11, r2, &(0x7f00000007c0)=""/219, 0xdb) r3 = geteuid() sendmsg$nl_netfilter(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0x200, 0x6, 0x8, 0x320, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x8}, [@generic="e2875eab26c7aaf79735616646593181a43383a03e85aafd8b95825a0f4af708f1350d4b6c5fb0dc712f7153dde1ee879fc3e9a3586a68775cb5611b5354ae7020acebb3355cf3e538b0422ef340354c7ac28fe9b2effa7e8a689cb917d82701e86752bac84774c188d26b8cc8c8a2dc8a6a2d8dc280a8b44f2a40fd65b84388fb7b34326893a8055e276f52c227af95a1f7793fc126c6bbe01e6471706794dbb2acd20852d722cc", @typed={0x8, 0x10, @ipv4=@multicast1}, @nested={0x14, 0x1c, [@typed={0x8, 0x16, @u32=0x8}, @typed={0x8, 0x30, @uid=r3}]}, @generic="f976e4c0e862a28b30f77b", @typed={0x8, 0xb, @fd=r0}, @typed={0xe0, 0x52, @binary="3110a2716135dd05137f698d803c16cf4ed749b93d8e843d4eaefa4324eaa0db253e878d617238c678d09145e5d1f9113a79ad0edddcaca6df2d8f24d33d8856a047cfe8a73191fdc35e5649008e86f119e9ff8f6f23f56717e345195cf77f0dccc623742c4d586cc2fdca726bbc8689c37b6ac439efec175930341b674b89e71e2180830212afbe1a3bd52dd4b869775194b384cf25747a7375bbca5b034ec357d36098afb079014438a78c3e43a6f0621547d86015c96cb99ac0fb9acdd047ea1db698fae5e1e33675d61bdb77656af096629a79cc4256f9"}, @nested={0xc, 0x31, [@typed={0x8, 0x25, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}]}, @typed={0x14, 0x83, @str='/dev/dmmidi#\x00'}, @typed={0xc, 0x20, @u64=0x9}, @typed={0x8, 0x73, @u32=0x2}]}, 0x200}, 0x1, 0x0, 0x0, 0x2004c880}, 0x800) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000940)={0x401, {{0xa, 0x4e21, 0xffffffffffffff80, @mcast1, 0xff}}, {{0xa, 0x4e24, 0x0, @mcast1}}}, 0x108) 23:26:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) 23:26:54 executing program 2 (fault-call:3 fault-nth:59): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 660.680914] BTRFS error (device loop1): open_ctree failed 23:26:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) [ 660.729395] FAULT_INJECTION: forcing a failure. [ 660.729395] name failslab, interval 1, probability 0, space 0, times 0 [ 660.753944] BTRFS error (device loop3): superblock checksum mismatch 23:26:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x8) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000001c0)=0x80000000, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x4800000, 0x4, 0x8, 0x1}, {0x8001, 0x9, 0x9, 0x3}, {0x7, 0x10001, 0x4, 0x25}, {0x3ff, 0x9, 0x2, 0x3}]}, 0x10) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000180)) syslog(0x2, &(0x7f0000000200)=""/107, 0x6b) [ 660.786831] CPU: 1 PID: 18827 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 660.793928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.803266] Call Trace: [ 660.805861] dump_stack+0x138/0x19c [ 660.805877] should_fail.cold+0x10f/0x159 [ 660.805893] should_failslab+0xdb/0x130 [ 660.805904] __kmalloc+0x2f0/0x7a0 [ 660.805914] ? match_token+0x22b/0x480 [ 660.805924] ? match_strdup+0x5f/0xa0 [ 660.805934] match_strdup+0x5f/0xa0 23:26:54 executing program 2 (fault-call:3 fault-nth:60): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 660.805946] btrfs_parse_early_options+0x241/0x310 [ 660.805958] ? btrfs_freeze+0xc0/0xc0 [ 660.805965] ? find_next_bit+0x28/0x30 [ 660.805975] ? pcpu_alloc+0xcf0/0x1050 [ 660.805986] ? pcpu_alloc+0xcf0/0x1050 [ 660.806000] btrfs_mount+0x11d/0x2b14 [ 660.806009] ? lock_downgrade+0x6e0/0x6e0 [ 660.806016] ? find_held_lock+0x35/0x130 [ 660.806025] ? pcpu_alloc+0x3af/0x1050 [ 660.806036] ? _find_next_bit+0xee/0x120 [ 660.806045] ? check_preemption_disabled+0x3c/0x250 [ 660.806054] ? btrfs_remount+0x11f0/0x11f0 [ 660.806068] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.806086] ? __lockdep_init_map+0x10c/0x570 23:26:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x400) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 660.806096] ? __lockdep_init_map+0x10c/0x570 [ 660.806108] mount_fs+0x97/0x2a1 [ 660.806121] vfs_kern_mount.part.0+0x5e/0x3d0 [ 660.806129] ? find_held_lock+0x35/0x130 [ 660.806140] vfs_kern_mount+0x40/0x60 [ 660.806151] btrfs_mount+0x3ce/0x2b14 [ 660.806159] ? lock_downgrade+0x6e0/0x6e0 [ 660.806166] ? find_held_lock+0x35/0x130 [ 660.806175] ? pcpu_alloc+0x3af/0x1050 [ 660.806190] ? btrfs_remount+0x11f0/0x11f0 [ 660.806203] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.806219] ? __lockdep_init_map+0x10c/0x570 23:26:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:54 executing program 2 (fault-call:3 fault-nth:61): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 660.806228] ? __lockdep_init_map+0x10c/0x570 [ 660.806238] mount_fs+0x97/0x2a1 [ 660.806249] vfs_kern_mount.part.0+0x5e/0x3d0 [ 660.806260] do_mount+0x417/0x27d0 [ 660.806269] ? copy_mount_options+0x5c/0x2f0 [ 660.806277] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.806286] ? copy_mount_string+0x40/0x40 [ 660.806299] ? copy_mount_options+0x1fe/0x2f0 [ 660.806308] SyS_mount+0xab/0x120 [ 660.806315] ? copy_mnt_ns+0x8c0/0x8c0 [ 660.806324] do_syscall_64+0x1e8/0x640 [ 660.806330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 660.806344] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 660.806351] RIP: 0033:0x45c27a [ 660.806356] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.806364] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 660.806368] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 660.806373] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 660.806377] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 660.806381] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 660.820545] BTRFS error (device loop3): open_ctree failed [ 660.825971] BTRFS error (device loop3): superblock checksum mismatch [ 660.890230] BTRFS error (device loop3): open_ctree failed [ 660.925337] BTRFS error (device loop3): superblock checksum mismatch [ 660.925603] FAULT_INJECTION: forcing a failure. [ 660.925603] name failslab, interval 1, probability 0, space 0, times 0 [ 660.925612] CPU: 0 PID: 18855 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 660.925616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.925619] Call Trace: [ 660.925631] dump_stack+0x138/0x19c [ 660.925646] should_fail.cold+0x10f/0x159 [ 660.925658] should_failslab+0xdb/0x130 [ 660.925667] __kmalloc_track_caller+0x2ec/0x790 [ 660.925678] ? unwind_get_return_address+0x61/0xa0 [ 660.925686] ? __save_stack_trace+0x7b/0xd0 [ 660.925695] ? btrfs_parse_early_options+0xa3/0x310 [ 660.925705] kstrdup+0x3a/0x70 [ 660.925714] btrfs_parse_early_options+0xa3/0x310 [ 660.925724] ? save_trace+0x290/0x290 [ 660.925731] ? btrfs_freeze+0xc0/0xc0 [ 660.925741] ? pcpu_alloc+0xcf0/0x1050 [ 660.925749] ? find_held_lock+0x35/0x130 [ 660.925757] ? pcpu_alloc+0xcf0/0x1050 [ 660.925769] btrfs_mount+0x11d/0x2b14 [ 660.925776] ? lock_downgrade+0x6e0/0x6e0 [ 660.925783] ? find_held_lock+0x35/0x130 [ 660.925791] ? pcpu_alloc+0x3af/0x1050 [ 660.925801] ? _find_next_bit+0xee/0x120 [ 660.925809] ? check_preemption_disabled+0x3c/0x250 [ 660.925817] ? btrfs_remount+0x11f0/0x11f0 [ 660.925829] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.925844] ? __lockdep_init_map+0x10c/0x570 [ 660.925853] ? __lockdep_init_map+0x10c/0x570 [ 660.925865] mount_fs+0x97/0x2a1 [ 660.925876] vfs_kern_mount.part.0+0x5e/0x3d0 [ 660.925883] ? find_held_lock+0x35/0x130 [ 660.925892] vfs_kern_mount+0x40/0x60 [ 660.925901] btrfs_mount+0x3ce/0x2b14 [ 660.925909] ? lock_downgrade+0x6e0/0x6e0 [ 660.925915] ? find_held_lock+0x35/0x130 [ 660.925924] ? pcpu_alloc+0x3af/0x1050 [ 660.925937] ? btrfs_remount+0x11f0/0x11f0 [ 660.925949] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.925964] ? __lockdep_init_map+0x10c/0x570 [ 660.925973] ? __lockdep_init_map+0x10c/0x570 [ 660.925984] mount_fs+0x97/0x2a1 [ 660.925994] vfs_kern_mount.part.0+0x5e/0x3d0 [ 660.926005] do_mount+0x417/0x27d0 [ 660.926013] ? copy_mount_options+0x5c/0x2f0 [ 660.926021] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.926030] ? copy_mount_string+0x40/0x40 [ 660.926042] ? copy_mount_options+0x1fe/0x2f0 [ 660.926053] SyS_mount+0xab/0x120 [ 660.926059] ? copy_mnt_ns+0x8c0/0x8c0 [ 660.926069] do_syscall_64+0x1e8/0x640 [ 660.926077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 660.926090] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 660.926096] RIP: 0033:0x45c27a [ 660.926101] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.926110] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 660.926114] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 660.926119] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 660.926123] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 660.926128] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 661.000624] BTRFS error (device loop3): open_ctree failed [ 661.178835] BTRFS error (device loop5): superblock checksum mismatch [ 661.260963] BTRFS error (device loop5): open_ctree failed [ 661.272754] FAULT_INJECTION: forcing a failure. [ 661.272754] name failslab, interval 1, probability 0, space 0, times 0 [ 661.280062] CPU: 0 PID: 18872 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 661.474364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.474367] Call Trace: 23:26:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) [ 661.474379] dump_stack+0x138/0x19c [ 661.474390] should_fail.cold+0x10f/0x159 [ 661.474400] should_failslab+0xdb/0x130 [ 661.474408] __kmalloc_track_caller+0x2ec/0x790 [ 661.474415] ? unwind_get_return_address+0x61/0xa0 [ 661.474422] ? __save_stack_trace+0x7b/0xd0 [ 661.474429] ? btrfs_parse_early_options+0xa3/0x310 [ 661.474437] kstrdup+0x3a/0x70 [ 661.474444] btrfs_parse_early_options+0xa3/0x310 [ 661.474452] ? save_trace+0x290/0x290 [ 661.474458] ? btrfs_freeze+0xc0/0xc0 [ 661.474463] ? find_next_bit+0x28/0x30 [ 661.474470] ? pcpu_alloc+0xcf0/0x1050 [ 661.474476] ? find_held_lock+0x35/0x130 [ 661.474482] ? pcpu_alloc+0xcf0/0x1050 [ 661.474491] btrfs_mount+0x11d/0x2b14 [ 661.474497] ? lock_downgrade+0x6e0/0x6e0 [ 661.474501] ? find_held_lock+0x35/0x130 [ 661.474507] ? pcpu_alloc+0x3af/0x1050 [ 661.474514] ? _find_next_bit+0xee/0x120 [ 661.474521] ? check_preemption_disabled+0x3c/0x250 [ 661.474527] ? btrfs_remount+0x11f0/0x11f0 [ 661.474538] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.474550] ? __lockdep_init_map+0x10c/0x570 23:26:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 661.474557] ? __lockdep_init_map+0x10c/0x570 [ 661.474566] mount_fs+0x97/0x2a1 [ 661.474575] vfs_kern_mount.part.0+0x5e/0x3d0 [ 661.474580] ? find_held_lock+0x35/0x130 [ 661.474587] vfs_kern_mount+0x40/0x60 [ 661.474594] btrfs_mount+0x3ce/0x2b14 [ 661.474600] ? lock_downgrade+0x6e0/0x6e0 [ 661.474604] ? find_held_lock+0x35/0x130 [ 661.474610] ? pcpu_alloc+0x3af/0x1050 [ 661.474620] ? btrfs_remount+0x11f0/0x11f0 [ 661.474629] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.474641] ? __lockdep_init_map+0x10c/0x570 23:26:55 executing program 2 (fault-call:3 fault-nth:62): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 661.474647] ? __lockdep_init_map+0x10c/0x570 [ 661.474656] mount_fs+0x97/0x2a1 [ 661.474663] vfs_kern_mount.part.0+0x5e/0x3d0 [ 661.474671] do_mount+0x417/0x27d0 [ 661.474677] ? copy_mount_options+0x5c/0x2f0 [ 661.474682] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.474690] ? copy_mount_string+0x40/0x40 [ 661.474698] ? copy_mount_options+0x1fe/0x2f0 [ 661.474706] SyS_mount+0xab/0x120 [ 661.474711] ? copy_mnt_ns+0x8c0/0x8c0 [ 661.474718] do_syscall_64+0x1e8/0x640 [ 661.474724] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:55 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:55 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 661.474733] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 661.474738] RIP: 0033:0x45c27a [ 661.474741] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 661.474747] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 661.474751] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 661.474754] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 661.474758] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 23:26:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804", 0x7b) [ 661.474761] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 661.671564] BTRFS error (device loop5): superblock checksum mismatch [ 661.749178] FAULT_INJECTION: forcing a failure. [ 661.749178] name failslab, interval 1, probability 0, space 0, times 0 [ 661.795330] CPU: 0 PID: 18892 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 661.802435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.802439] Call Trace: [ 661.802458] dump_stack+0x138/0x19c [ 661.817951] should_fail.cold+0x10f/0x159 [ 661.817964] should_failslab+0xdb/0x130 [ 661.826037] __kmalloc+0x2f0/0x7a0 [ 661.826045] ? match_token+0x22b/0x480 [ 661.826055] ? match_strdup+0x5f/0xa0 [ 661.826066] match_strdup+0x5f/0xa0 [ 661.840814] btrfs_parse_early_options+0x241/0x310 [ 661.845713] ? btrfs_freeze+0xc0/0xc0 [ 661.849488] ? pcpu_alloc+0xcf0/0x1050 [ 661.853346] ? pcpu_alloc+0xcf0/0x1050 [ 661.857206] btrfs_mount+0x11d/0x2b14 [ 661.860979] ? lock_downgrade+0x6e0/0x6e0 [ 661.865094] ? find_held_lock+0x35/0x130 [ 661.869124] ? pcpu_alloc+0x3af/0x1050 [ 661.872982] ? _find_next_bit+0xee/0x120 [ 661.877011] ? check_preemption_disabled+0x3c/0x250 [ 661.882006] ? btrfs_remount+0x11f0/0x11f0 [ 661.886223] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.891210] ? __lockdep_init_map+0x10c/0x570 [ 661.895676] ? __lockdep_init_map+0x10c/0x570 [ 661.900141] mount_fs+0x97/0x2a1 [ 661.903479] vfs_kern_mount.part.0+0x5e/0x3d0 [ 661.907942] ? find_held_lock+0x35/0x130 [ 661.911975] vfs_kern_mount+0x40/0x60 [ 661.915749] btrfs_mount+0x3ce/0x2b14 [ 661.919521] ? lock_downgrade+0x6e0/0x6e0 [ 661.923639] ? find_held_lock+0x35/0x130 [ 661.927680] ? pcpu_alloc+0x3af/0x1050 [ 661.931544] ? btrfs_remount+0x11f0/0x11f0 [ 661.935752] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.940752] ? __lockdep_init_map+0x10c/0x570 [ 661.945221] ? __lockdep_init_map+0x10c/0x570 [ 661.949691] mount_fs+0x97/0x2a1 [ 661.953028] vfs_kern_mount.part.0+0x5e/0x3d0 [ 661.957494] do_mount+0x417/0x27d0 [ 661.961003] ? copy_mount_options+0x5c/0x2f0 [ 661.965380] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.970366] ? copy_mount_string+0x40/0x40 [ 661.974571] ? copy_mount_options+0x1fe/0x2f0 [ 661.979039] SyS_mount+0xab/0x120 [ 661.982462] ? copy_mnt_ns+0x8c0/0x8c0 [ 661.986323] do_syscall_64+0x1e8/0x640 [ 661.990186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 661.995003] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 662.000161] RIP: 0033:0x45c27a [ 662.003319] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 662.011006] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 662.018390] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 662.025629] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 662.032867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 662.040114] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 662.100201] BTRFS error (device loop5): open_ctree failed [ 662.109966] BTRFS error (device loop3): superblock checksum mismatch 23:26:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x284000) getpeername$llc(r0, &(0x7f0000000100), &(0x7f0000000140)=0x10) 23:26:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:55 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804", 0x7b) 23:26:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000240)={0x3ff, 0x1, {0xffffffffffffffff, 0x1, 0xfffffffffffffffc, 0x3, 0x9}}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) getrlimit(0xf, &(0x7f0000000140)) fchdir(r1) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xceb28e6b0da054a3}, 0x10) ioctl(r0, 0x1000008915, &(0x7f0000000300)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x53, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:55 executing program 2 (fault-call:3 fault-nth:63): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 662.223026] BTRFS error (device loop3): open_ctree failed 23:26:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) 23:26:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 662.290780] FAULT_INJECTION: forcing a failure. [ 662.290780] name failslab, interval 1, probability 0, space 0, times 0 [ 662.318818] BTRFS error (device loop5): superblock checksum mismatch 23:26:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) [ 662.376747] CPU: 1 PID: 18922 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 662.383852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.393193] Call Trace: [ 662.395793] dump_stack+0x138/0x19c [ 662.395811] should_fail.cold+0x10f/0x159 [ 662.403550] should_failslab+0xdb/0x130 [ 662.403561] kmem_cache_alloc_trace+0x2e9/0x790 [ 662.412171] selinux_parse_opts_str+0x3c1/0xa30 23:26:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 662.412185] ? selinux_socket_sock_rcv_skb+0x570/0x570 [ 662.412198] ? free_pages+0x46/0x50 [ 662.412207] ? selinux_sb_copy_data+0x21e/0x390 [ 662.412221] security_sb_parse_opts_str+0x75/0xb0 [ 662.412232] parse_security_options+0x4e/0xa0 [ 662.412242] btrfs_mount+0x2bb/0x2b14 [ 662.412252] ? lock_downgrade+0x6e0/0x6e0 [ 662.412259] ? find_held_lock+0x35/0x130 23:26:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 662.412269] ? pcpu_alloc+0x3af/0x1050 [ 662.412284] ? btrfs_remount+0x11f0/0x11f0 [ 662.412299] ? rcu_read_lock_sched_held+0x110/0x130 [ 662.412316] ? __lockdep_init_map+0x10c/0x570 [ 662.412332] mount_fs+0x97/0x2a1 [ 662.412345] vfs_kern_mount.part.0+0x5e/0x3d0 [ 662.412351] ? find_held_lock+0x35/0x130 [ 662.412362] vfs_kern_mount+0x40/0x60 [ 662.412372] btrfs_mount+0x3ce/0x2b14 [ 662.412380] ? lock_downgrade+0x6e0/0x6e0 [ 662.412387] ? find_held_lock+0x35/0x130 [ 662.412396] ? pcpu_alloc+0x3af/0x1050 [ 662.412411] ? btrfs_remount+0x11f0/0x11f0 [ 662.412423] ? rcu_read_lock_sched_held+0x110/0x130 [ 662.412440] ? __lockdep_init_map+0x10c/0x570 [ 662.412450] ? __lockdep_init_map+0x10c/0x570 [ 662.412461] mount_fs+0x97/0x2a1 [ 662.412473] vfs_kern_mount.part.0+0x5e/0x3d0 [ 662.412484] do_mount+0x417/0x27d0 [ 662.412492] ? copy_mount_options+0x5c/0x2f0 [ 662.412500] ? rcu_read_lock_sched_held+0x110/0x130 [ 662.412511] ? copy_mount_string+0x40/0x40 [ 662.412524] ? copy_mount_options+0x1fe/0x2f0 [ 662.412535] SyS_mount+0xab/0x120 [ 662.412542] ? copy_mnt_ns+0x8c0/0x8c0 [ 662.412553] do_syscall_64+0x1e8/0x640 [ 662.412560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 662.412574] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 662.412581] RIP: 0033:0x45c27a [ 662.412585] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 662.412594] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 662.412599] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 662.412604] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 23:26:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) [ 662.412609] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 662.412613] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 662.433210] BTRFS error (device loop5): open_ctree failed [ 662.435526] BTRFS error (device loop5): superblock checksum mismatch [ 662.470477] BTRFS error (device loop5): open_ctree failed [ 662.473645] BTRFS error (device loop5): superblock checksum mismatch [ 662.790223] BTRFS error (device loop5): open_ctree failed [ 662.798139] BTRFS error (device loop3): superblock checksum mismatch 23:26:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0x2, @ipv4={[], [], @rand_addr=0x5}, 0x7}}, 0x0, 0x300000000, 0x0, "8ff9020d81cfdbb0cf5220fba081c72e97f9ac9d46694668088c8192e2a33f79d20327f2e96323812f1c420ae3aa9f9c9f9af7b8bca7cc2b2286b492345885ea57e94373c22ea630a1805715bf40e43d"}, 0x10) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xa) 23:26:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:56 executing program 2 (fault-call:3 fault-nth:64): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaa", 0x3e) [ 662.870974] BTRFS error (device loop3): open_ctree failed [ 662.879463] BTRFS error (device loop3): superblock checksum mismatch [ 662.946887] FAULT_INJECTION: forcing a failure. [ 662.946887] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 662.970266] BTRFS error (device loop3): open_ctree failed [ 662.990734] BTRFS error (device loop1): superblock checksum mismatch [ 663.009582] CPU: 1 PID: 18979 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 663.016683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.026022] Call Trace: [ 663.028602] dump_stack+0x138/0x19c [ 663.032221] should_fail.cold+0x10f/0x159 [ 663.036355] ? __might_sleep+0x93/0xb0 [ 663.040240] __alloc_pages_nodemask+0x1d6/0x7a0 [ 663.044897] ? check_preemption_disabled+0x3c/0x250 [ 663.049903] ? __alloc_pages_slowpath+0x2930/0x2930 [ 663.054903] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 663.060340] ? __alloc_pages_nodemask+0x639/0x7a0 [ 663.065176] alloc_pages_current+0xec/0x1e0 [ 663.069483] ? btrfs_parse_early_options+0x1a2/0x310 [ 663.074578] __get_free_pages+0xf/0x40 [ 663.078450] get_zeroed_page+0x11/0x20 [ 663.082321] selinux_sb_copy_data+0x2a/0x390 [ 663.086721] security_sb_copy_data+0x75/0xb0 [ 663.091115] parse_security_options+0x37/0xa0 [ 663.095590] btrfs_mount+0x2bb/0x2b14 [ 663.099369] ? lock_downgrade+0x6e0/0x6e0 [ 663.103487] ? find_held_lock+0x35/0x130 [ 663.107523] ? pcpu_alloc+0x3af/0x1050 [ 663.111386] ? btrfs_remount+0x11f0/0x11f0 [ 663.115596] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.120609] ? __lockdep_init_map+0x10c/0x570 [ 663.125084] mount_fs+0x97/0x2a1 [ 663.128423] vfs_kern_mount.part.0+0x5e/0x3d0 [ 663.132888] ? find_held_lock+0x35/0x130 [ 663.136922] vfs_kern_mount+0x40/0x60 [ 663.140701] btrfs_mount+0x3ce/0x2b14 [ 663.144483] ? lock_downgrade+0x6e0/0x6e0 [ 663.148611] ? find_held_lock+0x35/0x130 [ 663.152642] ? pcpu_alloc+0x3af/0x1050 [ 663.156500] ? btrfs_remount+0x11f0/0x11f0 [ 663.160719] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.165718] ? __lockdep_init_map+0x10c/0x570 [ 663.170184] ? __lockdep_init_map+0x10c/0x570 [ 663.174653] mount_fs+0x97/0x2a1 [ 663.177991] vfs_kern_mount.part.0+0x5e/0x3d0 [ 663.182468] do_mount+0x417/0x27d0 [ 663.185993] ? copy_mount_options+0x5c/0x2f0 [ 663.190376] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.195363] ? copy_mount_string+0x40/0x40 [ 663.199571] ? copy_mount_options+0x1fe/0x2f0 [ 663.204037] SyS_mount+0xab/0x120 [ 663.207465] ? copy_mnt_ns+0x8c0/0x8c0 [ 663.211324] do_syscall_64+0x1e8/0x640 [ 663.215184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 663.220024] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 663.225189] RIP: 0033:0x45c27a [ 663.228348] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 663.236055] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 663.243300] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 663.250542] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 663.257782] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 663.265023] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaa", 0x3e) 23:26:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="ca5c344a35ab86ce", 0x8, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='\x00', 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) 23:26:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:56 executing program 2 (fault-call:3 fault-nth:65): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaa", 0x3e) 23:26:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 663.320388] BTRFS error (device loop1): open_ctree failed [ 663.360416] BTRFS error (device loop3): superblock checksum mismatch 23:26:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba3", 0x5d) [ 663.410398] BTRFS error (device loop3): open_ctree failed [ 663.425193] FAULT_INJECTION: forcing a failure. [ 663.425193] name failslab, interval 1, probability 0, space 0, times 0 [ 663.466642] BTRFS error (device loop5): superblock checksum mismatch [ 663.468984] CPU: 0 PID: 19005 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 663.480212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.489554] Call Trace: [ 663.492137] dump_stack+0x138/0x19c [ 663.495757] should_fail.cold+0x10f/0x159 [ 663.499893] should_failslab+0xdb/0x130 [ 663.503846] kmem_cache_alloc_trace+0x2e9/0x790 [ 663.508495] selinux_parse_opts_str+0x3c1/0xa30 [ 663.513141] ? selinux_socket_sock_rcv_skb+0x570/0x570 [ 663.518394] ? free_pages+0x46/0x50 [ 663.521993] ? selinux_sb_copy_data+0x21e/0x390 [ 663.526633] security_sb_parse_opts_str+0x75/0xb0 [ 663.531448] parse_security_options+0x4e/0xa0 [ 663.535914] btrfs_mount+0x2bb/0x2b14 [ 663.539688] ? lock_downgrade+0x6e0/0x6e0 [ 663.543808] ? find_held_lock+0x35/0x130 [ 663.547838] ? pcpu_alloc+0x3af/0x1050 [ 663.551702] ? btrfs_remount+0x11f0/0x11f0 [ 663.555913] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.560906] ? __lockdep_init_map+0x10c/0x570 [ 663.565393] mount_fs+0x97/0x2a1 [ 663.568735] vfs_kern_mount.part.0+0x5e/0x3d0 [ 663.573203] ? find_held_lock+0x35/0x130 [ 663.577238] vfs_kern_mount+0x40/0x60 [ 663.581009] btrfs_mount+0x3ce/0x2b14 [ 663.584781] ? lock_downgrade+0x6e0/0x6e0 [ 663.588899] ? find_held_lock+0x35/0x130 [ 663.592931] ? pcpu_alloc+0x3af/0x1050 [ 663.596794] ? btrfs_remount+0x11f0/0x11f0 [ 663.601000] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.605997] ? __lockdep_init_map+0x10c/0x570 [ 663.610463] ? __lockdep_init_map+0x10c/0x570 [ 663.614931] mount_fs+0x97/0x2a1 [ 663.618272] vfs_kern_mount.part.0+0x5e/0x3d0 [ 663.622740] do_mount+0x417/0x27d0 [ 663.626250] ? copy_mount_options+0x5c/0x2f0 [ 663.630631] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.635620] ? copy_mount_string+0x40/0x40 [ 663.639829] ? copy_mount_options+0x1fe/0x2f0 [ 663.644298] SyS_mount+0xab/0x120 [ 663.647722] ? copy_mnt_ns+0x8c0/0x8c0 [ 663.651583] do_syscall_64+0x1e8/0x640 [ 663.655442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 663.660258] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 663.665425] RIP: 0033:0x45c27a [ 663.668589] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 663.676266] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 663.683505] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 663.690748] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 663.697990] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 663.705229] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 663.754025] BTRFS error (device loop5): open_ctree failed [ 663.763140] BTRFS error (device loop5): superblock checksum mismatch [ 663.800100] BTRFS error (device loop5): open_ctree failed [ 663.808586] BTRFS error (device loop5): superblock checksum mismatch [ 663.840083] net_ratelimit: 25 callbacks suppressed [ 663.840087] protocol 88fb is buggy, dev hsr_slave_0 23:26:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) 23:26:57 executing program 2 (fault-call:3 fault-nth:66): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)="43a812f7b7fb97f7d15bdd88d5e23f48e6da52ca155f42f888130b075e6d9293fde41ed1db2b6b1c9f96ea7936ffc60611bf0845396a62b89b4719e06aa4b317a0dcff872a6e9e194d3b65b5d5bfb9b390f45736aa02fa86a81531bc4f8be1c04ef04e0775af4038767d74be08fc5b51c994c3189d0a52b2f609ffe7517f0fbb4aecc0c59c9484c3e4376f821426e982", 0x90, 0x8000}, {&(0x7f0000000200)="58da8612abbc5419c1318a6daa2f3e6927ee63d222d3111594776ab4116518a236892ad98bb099374283770a5281c0c49bdc409521fc4045b960c1408b41bca5ddf185cafba5043499227ecf0e9df71e64bdf3dd649c681dfbdb63e2583d69fe610a213cd7d994ef6a70ad926dcd24d90c078825d5e93363f58e6a6b3c4ba668ca515c580084e5b13d29f8ee8aa8b881ea88ef90c7c785ff636338b8ee5115f44465d4248b8e34fef08242847f3bef4c096096", 0xb3, 0x2}, {&(0x7f00000002c0)="153d3e098420b934d08fb3b4fda3c091ea364b922d552b686ccbc9e66d73ce5a4b41fa6b2dff003f037a88a0c0b3ab3908c1cb8a59727b14810421660fbea1da92dbed689c5070dc73759fc3e0931c46b670fe91b07e30a33d917f7dfa5659b6ec102939284177a8bd3f83f226311034f932e3a85fc4407df27141943d1ac92426b6842485e8b6854063165018834f9d0b61dd2adcb35d9998", 0x99, 0x1}, {&(0x7f0000000380)="7a03b965863a9126ec9a0d061cc033ba1c481fed736fb3ca9f80cd2a485204a8970a59cea37134a950096cdfa791b62a78d68f7fb6f0aef01c9492a2781fcd1848c4867a63a4c51758d767f4774ccd6091031802bbf87376730176d17fb73da8a5938c32c6159f7213dffe4340e784f65110d435dadffd410ab3cffb9bd8f58aa64978441a406032c7d95e5ce451929f3577ac160bc3ea797503418fb180bbf07272238426a08b5c7e25b83807ebbd2905017907b5d8b526b2322f5254d5eb53f0b96b853ac6afecf3c9733fccea", 0xce, 0x7}], 0x200000, &(0x7f0000000500)='.(system%nodevtrusted!em0\'%-trustedposix_acl_access:\x00') 23:26:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 663.850295] protocol 88fb is buggy, dev hsr_slave_1 [ 663.855335] protocol 88fb is buggy, dev hsr_slave_0 [ 663.860349] protocol 88fb is buggy, dev hsr_slave_1 [ 663.870181] BTRFS error (device loop5): open_ctree failed 23:26:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffffffff, &(0x7f0000000100)="29c32743f65d568db9b185b19c463813af1f17bc3b0bf594d66608b6a27c2804c88b539337a53c31968e329d27cd128f4425ad2351b7bbcfc351c390210b1edebc32d19eca28c10b057d9f20ace73050854abfc805d6350702f657d68efe1ff475d829d1a4049321b20b4cfb6e29f5c5b8d611f53b7d917a") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) 23:26:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 663.958775] FAULT_INJECTION: forcing a failure. [ 663.958775] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 663.970676] CPU: 1 PID: 19038 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 663.970684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.970687] Call Trace: [ 663.970703] dump_stack+0x138/0x19c [ 663.970719] should_fail.cold+0x10f/0x159 [ 663.970736] __alloc_pages_nodemask+0x1d6/0x7a0 [ 663.970749] ? __alloc_pages_slowpath+0x2930/0x2930 [ 663.970769] cache_grow_begin+0x80/0x400 [ 663.970779] kmem_cache_alloc+0x6a6/0x780 [ 663.970792] getname_kernel+0x53/0x350 [ 664.007158] kern_path+0x20/0x40 [ 664.007169] lookup_bdev.part.0+0x63/0x160 [ 664.007177] ? blkdev_open+0x260/0x260 [ 664.007189] ? free_hot_cold_page+0x763/0xca0 [ 664.019336] blkdev_get_by_path+0x76/0xf0 [ 664.019350] btrfs_scan_one_device+0x97/0x400 [ 664.019360] ? device_list_add+0x8d0/0x8d0 [ 664.019369] ? __free_pages+0x54/0x90 [ 664.051789] ? free_pages+0x46/0x50 [ 664.055390] btrfs_mount+0x2e3/0x2b14 [ 664.059166] ? lock_downgrade+0x6e0/0x6e0 [ 664.063283] ? find_held_lock+0x35/0x130 [ 664.067319] ? pcpu_alloc+0x3af/0x1050 [ 664.071183] ? btrfs_remount+0x11f0/0x11f0 [ 664.075391] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.080084] protocol 88fb is buggy, dev hsr_slave_0 [ 664.080389] ? __lockdep_init_map+0x10c/0x570 [ 664.085402] protocol 88fb is buggy, dev hsr_slave_1 [ 664.089844] mount_fs+0x97/0x2a1 [ 664.098159] vfs_kern_mount.part.0+0x5e/0x3d0 [ 664.102628] ? find_held_lock+0x35/0x130 [ 664.106659] vfs_kern_mount+0x40/0x60 [ 664.110432] btrfs_mount+0x3ce/0x2b14 [ 664.114205] ? lock_downgrade+0x6e0/0x6e0 [ 664.118324] ? find_held_lock+0x35/0x130 [ 664.122355] ? pcpu_alloc+0x3af/0x1050 [ 664.126220] ? btrfs_remount+0x11f0/0x11f0 [ 664.130428] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.135419] ? __lockdep_init_map+0x10c/0x570 [ 664.139885] ? __lockdep_init_map+0x10c/0x570 [ 664.144352] mount_fs+0x97/0x2a1 [ 664.147694] vfs_kern_mount.part.0+0x5e/0x3d0 [ 664.152160] do_mount+0x417/0x27d0 [ 664.155669] ? copy_mount_options+0x5c/0x2f0 [ 664.160051] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.165041] ? copy_mount_string+0x40/0x40 [ 664.169247] ? copy_mount_options+0x1fe/0x2f0 [ 664.173715] SyS_mount+0xab/0x120 [ 664.177138] ? copy_mnt_ns+0x8c0/0x8c0 [ 664.181001] do_syscall_64+0x1e8/0x640 [ 664.184858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 664.189676] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 664.194833] RIP: 0033:0x45c27a [ 664.197993] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 664.205671] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 664.212912] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 664.220154] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 664.227397] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 664.234638] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 664.242033] protocol 88fb is buggy, dev hsr_slave_0 [ 664.247068] protocol 88fb is buggy, dev hsr_slave_1 23:26:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) 23:26:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 664.257491] BTRFS error (device loop5): superblock checksum mismatch 23:26:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:26:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 664.320113] protocol 88fb is buggy, dev hsr_slave_0 [ 664.325255] protocol 88fb is buggy, dev hsr_slave_1 [ 664.380622] BTRFS error (device loop5): open_ctree failed [ 664.387534] BTRFS error (device loop5): superblock checksum mismatch [ 664.460675] BTRFS error (device loop5): open_ctree failed [ 664.468929] BTRFS error (device loop5): superblock checksum mismatch [ 664.550296] BTRFS error (device loop5): open_ctree failed [ 664.587755] BTRFS error (device loop3): superblock checksum mismatch [ 664.630217] BTRFS error (device loop3): open_ctree failed 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:26:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:58 executing program 2 (fault-call:3 fault-nth:67): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt(r0, 0x73, 0xfff, &(0x7f0000000200)=""/40, &(0x7f0000000240)=0x28) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x3a1401, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x80000000, 0x0, 0x4964def9}) 23:26:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$selinux_context(r0, &(0x7f0000000440)='system_u:object_r:fixed_disk_dev\x03\x00\x00\x00t:s0\x00', 0x29) ioctl(r0, 0x1000008912, &(0x7f0000000100)="f84319d8fc56af8834ca8b98d5fa5a0270") syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x400, 0x40000) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000047f001c2fa51bba5c44d60000e0000002ac1414bb"], 0x18) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x200000, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@msize={'msize', 0x3d, 0x6}}, {@cachetag={'cachetag', 0x3d, 'btrfs\x00'}}, {@version_u='version=9p2000.u'}], [{@context={'context', 0x3d, 'system_u'}}]}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 664.787205] Unknown ioctl 22025 [ 664.797902] BTRFS error (device loop3): superblock checksum mismatch [ 664.798712] FAULT_INJECTION: forcing a failure. [ 664.798712] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 664.816172] CPU: 0 PID: 19101 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 664.823255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.832595] Call Trace: [ 664.835170] dump_stack+0x138/0x19c [ 664.838791] should_fail.cold+0x10f/0x159 [ 664.842926] __alloc_pages_nodemask+0x1d6/0x7a0 [ 664.847670] ? __alloc_pages_slowpath+0x2930/0x2930 [ 664.852682] cache_grow_begin+0x80/0x400 [ 664.852694] kmem_cache_alloc+0x6a6/0x780 [ 664.852707] getname_kernel+0x53/0x350 [ 664.852716] kern_path+0x20/0x40 [ 664.852725] lookup_bdev.part.0+0x63/0x160 [ 664.852735] ? blkdev_open+0x260/0x260 [ 664.860891] ? free_hot_cold_page+0x763/0xca0 [ 664.860902] blkdev_get_by_path+0x76/0xf0 [ 664.860916] btrfs_scan_one_device+0x97/0x400 [ 664.860927] ? device_list_add+0x8d0/0x8d0 [ 664.860935] ? __free_pages+0x54/0x90 [ 664.860958] ? free_pages+0x46/0x50 [ 664.860971] btrfs_mount+0x2e3/0x2b14 [ 664.860980] ? lock_downgrade+0x6e0/0x6e0 [ 664.860987] ? find_held_lock+0x35/0x130 [ 664.860997] ? pcpu_alloc+0x3af/0x1050 [ 664.861012] ? btrfs_remount+0x11f0/0x11f0 [ 664.861027] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.861043] ? __lockdep_init_map+0x10c/0x570 [ 664.861057] mount_fs+0x97/0x2a1 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 664.861069] vfs_kern_mount.part.0+0x5e/0x3d0 [ 664.861078] ? find_held_lock+0x35/0x130 [ 664.942591] vfs_kern_mount+0x40/0x60 [ 664.942603] btrfs_mount+0x3ce/0x2b14 [ 664.942613] ? lock_downgrade+0x6e0/0x6e0 [ 664.942619] ? find_held_lock+0x35/0x130 [ 664.942631] ? pcpu_alloc+0x3af/0x1050 [ 664.962234] ? btrfs_remount+0x11f0/0x11f0 [ 664.966467] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.966482] ? __lockdep_init_map+0x10c/0x570 [ 664.966490] ? __lockdep_init_map+0x10c/0x570 [ 664.966500] mount_fs+0x97/0x2a1 [ 664.966510] vfs_kern_mount.part.0+0x5e/0x3d0 [ 664.966519] do_mount+0x417/0x27d0 [ 664.966525] ? copy_mount_options+0x5c/0x2f0 [ 664.966532] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.966543] ? copy_mount_string+0x40/0x40 [ 664.966555] ? copy_mount_options+0x1fe/0x2f0 [ 664.966566] SyS_mount+0xab/0x120 [ 664.966573] ? copy_mnt_ns+0x8c0/0x8c0 [ 664.966585] do_syscall_64+0x1e8/0x640 [ 664.966592] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 664.966607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 23:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) [ 664.966614] RIP: 0033:0x45c27a [ 664.966619] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 664.966628] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 664.966634] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 664.966638] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 664.966643] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 664.966648] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) [ 665.022674] BTRFS error (device loop3): open_ctree failed [ 665.134309] BTRFS error (device loop3): superblock checksum mismatch [ 665.190444] BTRFS error (device loop3): open_ctree failed [ 665.197556] BTRFS error (device loop3): superblock checksum mismatch 23:26:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:58 executing program 3: r0 = getuid() syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)="24c8c10a5028be9d0191758ea203fe74f2ae12d12f0121623123f6ab0685d266430afe276f0c86b565e72df51466d58a3c4b98da662f1cb8bcafe0b39a45f0a126077e62b0e6b8b039595b8967f4fdea9e8ede071b7c452b", 0x58, 0x400}, {&(0x7f0000000240)="23d8987999cbaf392a2d2c42d706629f38b1a90dd7cb752bc109a090a3d562655e5c394656e5347d0194512ce631d052d60dfdd028ec4fe5be6f812bb0fd32380e110349c48dd855c21e3074fefcda482df400812d7a86af35664f9ee0bd4fa1bbe8b72aef4f5302c29090452e437962d7b5f1b5e7a2158176235dc592bff594e00422407d6e3104c970c25e60eec6f20d126b4c954def2cacb1d47af14ab2feac55d58b1c20272b83193029a746ce", 0xaf, 0xfffffffffffff91f}, {&(0x7f0000000300)="cc4aa8910125752870a21401617563dd30fdd6e33a78e5de25b0163a84618205eb9f0d1f028066d83b99f7f617", 0x2d, 0x81}], 0x2060a0, &(0x7f00000003c0)={[{@alloc_mode_reuse='alloc_mode=reuse'}, {@two_active_logs='active_logs=2'}, {@noquota='noquota'}, {@norecovery='norecovery'}], [{@pcr={'pcr', 0x3d, 0x2b}}, {@uid_gt={'uid>', r0}}, {@context={'context', 0x3d, 'root'}}]}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaac20, &(0x7f0000000000)=[{&(0x7f00000000c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'bcsh0\x00', {0x2, 0x4e24, @multicast2}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 23:26:58 executing program 2 (fault-call:3 fault-nth:68): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(0x0, 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 665.280181] BTRFS error (device loop3): open_ctree failed [ 665.291105] BTRFS error (device loop5): superblock checksum mismatch [ 665.320299] BTRFS error (device loop5): open_ctree failed 23:26:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 665.406460] FAULT_INJECTION: forcing a failure. [ 665.406460] name failslab, interval 1, probability 0, space 0, times 0 [ 665.432450] CPU: 1 PID: 19163 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 665.439543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.448874] Call Trace: [ 665.448889] dump_stack+0x138/0x19c 23:26:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de2", 0x47) [ 665.448907] should_fail.cold+0x10f/0x159 [ 665.448922] should_failslab+0xdb/0x130 [ 665.448934] kmem_cache_alloc+0x2d7/0x780 [ 665.448944] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 665.448955] ? btrfs_scan_one_device+0x89/0x400 [ 665.448963] ? trace_hardirqs_on_caller+0x400/0x590 [ 665.448973] getname_kernel+0x53/0x350 [ 665.486795] kern_path+0x20/0x40 [ 665.490158] lookup_bdev.part.0+0x63/0x160 [ 665.494391] ? blkdev_open+0x260/0x260 [ 665.498271] ? free_hot_cold_page+0x763/0xca0 [ 665.502759] blkdev_get_by_path+0x76/0xf0 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(0x0, 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 665.506909] btrfs_scan_one_device+0x97/0x400 [ 665.511411] ? device_list_add+0x8d0/0x8d0 [ 665.515647] ? __free_pages+0x54/0x90 [ 665.519438] ? free_pages+0x46/0x50 [ 665.523081] btrfs_mount+0x2e3/0x2b14 [ 665.523093] ? lock_downgrade+0x6e0/0x6e0 [ 665.523101] ? find_held_lock+0x35/0x130 [ 665.523112] ? pcpu_alloc+0x3af/0x1050 [ 665.523128] ? btrfs_remount+0x11f0/0x11f0 [ 665.523143] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.523161] ? __lockdep_init_map+0x10c/0x570 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(0x0, 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 665.523177] mount_fs+0x97/0x2a1 [ 665.523190] vfs_kern_mount.part.0+0x5e/0x3d0 [ 665.523198] ? find_held_lock+0x35/0x130 [ 665.523209] vfs_kern_mount+0x40/0x60 [ 665.523220] btrfs_mount+0x3ce/0x2b14 [ 665.523228] ? lock_downgrade+0x6e0/0x6e0 [ 665.523235] ? find_held_lock+0x35/0x130 [ 665.523244] ? pcpu_alloc+0x3af/0x1050 [ 665.523259] ? btrfs_remount+0x11f0/0x11f0 [ 665.523272] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.523290] ? __lockdep_init_map+0x10c/0x570 [ 665.523300] ? __lockdep_init_map+0x10c/0x570 23:26:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 665.523313] mount_fs+0x97/0x2a1 [ 665.523325] vfs_kern_mount.part.0+0x5e/0x3d0 [ 665.523337] do_mount+0x417/0x27d0 [ 665.523345] ? copy_mount_options+0x5c/0x2f0 [ 665.523354] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.523365] ? copy_mount_string+0x40/0x40 [ 665.523378] ? copy_mount_options+0x1fe/0x2f0 [ 665.523394] SyS_mount+0xab/0x120 [ 665.523402] ? copy_mnt_ns+0x8c0/0x8c0 [ 665.523414] do_syscall_64+0x1e8/0x640 [ 665.523421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 665.523437] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 665.523443] RIP: 0033:0x45c27a [ 665.523448] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 665.523457] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 665.523462] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 665.523467] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 665.523472] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 665.523477] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000340)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000002c0)="8da43670b33ac0ed0000000000000001004d59faca9401000000000000000000000000000000fff6f2a229f148aeb91e1b00920efd9a08000100e3ffffff01000000000000005f42485266535f4d", 0x4e, 0x10000}], 0x10004, 0x0) [ 665.703003] BTRFS error (device loop1): superblock checksum mismatch [ 665.774089] BTRFS error (device loop1): open_ctree failed [ 665.784061] BTRFS error (device loop1): superblock checksum mismatch [ 665.820229] BTRFS error (device loop1): open_ctree failed [ 665.836561] BTRFS error (device loop1): superblock checksum mismatch 23:26:59 executing program 2 (fault-call:3 fault-nth:69): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de2", 0x47) 23:26:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2d3, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x39c, 0x10000}], 0x800, 0x0) 23:26:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0xbffffffffffff800, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:26:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:26:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de2", 0x47) [ 665.880199] BTRFS error (device loop1): open_ctree failed 23:26:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x0) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 665.945619] FAULT_INJECTION: forcing a failure. [ 665.945619] name failslab, interval 1, probability 0, space 0, times 0 [ 665.982173] CPU: 1 PID: 19216 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 665.989271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.998628] Call Trace: [ 665.998643] dump_stack+0x138/0x19c [ 665.998663] should_fail.cold+0x10f/0x159 [ 665.998679] should_failslab+0xdb/0x130 [ 665.998691] kmem_cache_alloc+0x2d7/0x780 [ 665.998703] ? delete_node+0x1fb/0x690 [ 665.998718] ? save_trace+0x290/0x290 [ 665.998733] alloc_buffer_head+0x24/0xe0 [ 665.998744] alloc_page_buffers+0xb7/0x200 [ 665.998758] create_empty_buffers+0x39/0x480 [ 665.998767] ? __lock_is_held+0xb6/0x140 [ 665.998777] ? check_preemption_disabled+0x3c/0x250 [ 665.998791] create_page_buffers+0x153/0x1c0 [ 665.998800] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 665.998813] block_read_full_page+0xcd/0x960 [ 665.998826] ? set_init_blocksize+0x220/0x220 [ 665.998836] ? __lru_cache_add+0x18a/0x250 [ 665.998848] ? __bread_gfp+0x290/0x290 [ 665.998860] ? add_to_page_cache_lru+0x159/0x310 [ 665.998871] ? add_to_page_cache_locked+0x40/0x40 [ 665.998885] blkdev_readpage+0x1d/0x30 [ 665.998895] do_read_cache_page+0x671/0xfc0 [ 665.998906] ? blkdev_writepages+0xd0/0xd0 [ 665.998923] ? find_get_pages_contig+0xaa0/0xaa0 [ 665.998932] ? blkdev_get+0xb0/0x8e0 [ 665.998955] ? dput.part.0+0x170/0x750 [ 665.998967] ? bd_may_claim+0xd0/0xd0 [ 665.998977] ? path_put+0x50/0x70 [ 665.998986] ? lookup_bdev.part.0+0xe1/0x160 [ 665.998997] read_cache_page_gfp+0x6e/0x90 [ 665.999010] btrfs_read_disk_super+0xdd/0x440 [ 665.999023] btrfs_scan_one_device+0xc6/0x400 [ 665.999035] ? device_list_add+0x8d0/0x8d0 [ 665.999046] ? __free_pages+0x54/0x90 [ 665.999056] ? free_pages+0x46/0x50 [ 665.999070] btrfs_mount+0x2e3/0x2b14 [ 665.999079] ? lock_downgrade+0x6e0/0x6e0 [ 665.999087] ? find_held_lock+0x35/0x130 [ 665.999097] ? pcpu_alloc+0x3af/0x1050 [ 665.999114] ? btrfs_remount+0x11f0/0x11f0 [ 665.999130] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.999148] ? __lockdep_init_map+0x10c/0x570 [ 665.999164] mount_fs+0x97/0x2a1 [ 665.999178] vfs_kern_mount.part.0+0x5e/0x3d0 [ 665.999186] ? find_held_lock+0x35/0x130 [ 665.999198] vfs_kern_mount+0x40/0x60 [ 665.999210] btrfs_mount+0x3ce/0x2b14 [ 665.999219] ? lock_downgrade+0x6e0/0x6e0 [ 665.999226] ? find_held_lock+0x35/0x130 [ 665.999236] ? pcpu_alloc+0x3af/0x1050 [ 665.999253] ? btrfs_remount+0x11f0/0x11f0 [ 665.999268] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.999287] ? __lockdep_init_map+0x10c/0x570 [ 665.999298] ? __lockdep_init_map+0x10c/0x570 [ 665.999311] mount_fs+0x97/0x2a1 [ 665.999324] vfs_kern_mount.part.0+0x5e/0x3d0 [ 665.999336] do_mount+0x417/0x27d0 [ 665.999351] ? copy_mount_options+0x5c/0x2f0 [ 665.999360] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.999373] ? copy_mount_string+0x40/0x40 [ 665.999388] ? copy_mount_options+0x1fe/0x2f0 [ 665.999400] SyS_mount+0xab/0x120 [ 665.999408] ? copy_mnt_ns+0x8c0/0x8c0 [ 665.999421] do_syscall_64+0x1e8/0x640 [ 665.999429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 665.999444] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 665.999452] RIP: 0033:0x45c27a [ 665.999458] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 665.999468] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a 23:26:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc8", 0x4b) 23:26:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 665.999474] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 665.999480] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 665.999485] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 665.999491] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:26:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 666.340570] BTRFS error (device loop2): superblock checksum mismatch 23:26:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc8", 0x4b) 23:26:59 executing program 2 (fault-call:3 fault-nth:70): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:26:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) [ 666.430149] BTRFS error (device loop2): open_ctree failed [ 666.444944] BTRFS error (device loop1): superblock checksum mismatch [ 666.476372] FAULT_INJECTION: forcing a failure. [ 666.476372] name failslab, interval 1, probability 0, space 0, times 0 [ 666.488998] CPU: 0 PID: 19256 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 666.496097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.505439] Call Trace: [ 666.508020] dump_stack+0x138/0x19c [ 666.511648] should_fail.cold+0x10f/0x159 [ 666.515785] should_failslab+0xdb/0x130 [ 666.515799] __kmalloc+0x2f0/0x7a0 [ 666.515810] ? __lock_is_held+0xb6/0x140 [ 666.515817] ? blkdev_get+0xb0/0x8e0 [ 666.515827] ? kzalloc+0x1e/0x30 [ 666.523294] kzalloc+0x1e/0x30 [ 666.523305] device_list_add+0x5e0/0x8d0 [ 666.523317] ? btrfs_rm_dev_replace_free_srcdev+0x2f0/0x2f0 [ 666.523327] ? btrfs_read_disk_super+0x98/0x440 [ 666.523337] btrfs_scan_one_device+0x267/0x400 [ 666.523348] ? device_list_add+0x8d0/0x8d0 [ 666.560684] ? __free_pages+0x54/0x90 [ 666.564455] ? free_pages+0x46/0x50 [ 666.568055] btrfs_mount+0x2e3/0x2b14 [ 666.571828] ? lock_downgrade+0x6e0/0x6e0 [ 666.575944] ? find_held_lock+0x35/0x130 [ 666.579975] ? pcpu_alloc+0x3af/0x1050 [ 666.583840] ? btrfs_remount+0x11f0/0x11f0 [ 666.588121] ? rcu_read_lock_sched_held+0x110/0x130 [ 666.593112] ? __lockdep_init_map+0x10c/0x570 [ 666.597583] mount_fs+0x97/0x2a1 [ 666.600924] vfs_kern_mount.part.0+0x5e/0x3d0 [ 666.605390] ? find_held_lock+0x35/0x130 [ 666.609423] vfs_kern_mount+0x40/0x60 [ 666.613197] btrfs_mount+0x3ce/0x2b14 [ 666.616971] ? lock_downgrade+0x6e0/0x6e0 [ 666.621090] ? find_held_lock+0x35/0x130 [ 666.625120] ? pcpu_alloc+0x3af/0x1050 [ 666.628983] ? btrfs_remount+0x11f0/0x11f0 [ 666.633190] ? rcu_read_lock_sched_held+0x110/0x130 [ 666.638182] ? __lockdep_init_map+0x10c/0x570 [ 666.642649] ? __lockdep_init_map+0x10c/0x570 [ 666.647135] mount_fs+0x97/0x2a1 [ 666.650475] vfs_kern_mount.part.0+0x5e/0x3d0 [ 666.654947] do_mount+0x417/0x27d0 [ 666.658458] ? copy_mount_options+0x5c/0x2f0 [ 666.662846] ? rcu_read_lock_sched_held+0x110/0x130 [ 666.667837] ? copy_mount_string+0x40/0x40 [ 666.672044] ? copy_mount_options+0x1fe/0x2f0 [ 666.676511] SyS_mount+0xab/0x120 [ 666.679935] ? copy_mnt_ns+0x8c0/0x8c0 [ 666.683798] do_syscall_64+0x1e8/0x640 [ 666.687654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 666.692471] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 666.697634] RIP: 0033:0x45c27a [ 666.700794] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 666.708471] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 666.715711] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 666.722950] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 666.730190] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 666.737428] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 666.753752] BTRFS error (device loop1): open_ctree failed 23:27:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc8", 0x4b) 23:27:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, 0x0, 0x0) 23:27:00 executing program 2 (fault-call:3 fault-nth:71): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:00 executing program 3: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/70) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a22997aeb81e1b009307fd9a000001000000000001000000000000005f42485266535f4d00", 0x48, 0x10000}], 0xf43, 0x0) 23:27:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$midi(&(0x7f0000000f00)='/dev/midi#\x00', 0x7fffffff, 0x10000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000f80)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000001140)={&(0x7f0000000f40), 0xc, &(0x7f0000001100)={&(0x7f0000000fc0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x118}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) r3 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f00000000c0)) lsetxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) 23:27:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, 0x0, 0x0) [ 666.994137] FAULT_INJECTION: forcing a failure. [ 666.994137] name failslab, interval 1, probability 0, space 0, times 0 [ 667.022817] CPU: 1 PID: 19278 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 667.029922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.039257] Call Trace: [ 667.039273] dump_stack+0x138/0x19c [ 667.039290] should_fail.cold+0x10f/0x159 [ 667.039306] should_failslab+0xdb/0x130 [ 667.049589] kmem_cache_alloc+0x2d7/0x780 [ 667.049598] ? delete_node+0x1fb/0x690 [ 667.049610] ? save_trace+0x290/0x290 [ 667.061543] alloc_buffer_head+0x24/0xe0 [ 667.061554] alloc_page_buffers+0xb7/0x200 [ 667.061566] create_empty_buffers+0x39/0x480 [ 667.061575] ? __lock_is_held+0xb6/0x140 [ 667.061583] ? check_preemption_disabled+0x3c/0x250 [ 667.061594] create_page_buffers+0x153/0x1c0 23:27:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554", 0x4d) [ 667.069401] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 667.069412] block_read_full_page+0xcd/0x960 [ 667.069423] ? set_init_blocksize+0x220/0x220 [ 667.069432] ? __lru_cache_add+0x18a/0x250 [ 667.069442] ? __bread_gfp+0x290/0x290 [ 667.078032] ? add_to_page_cache_lru+0x159/0x310 [ 667.078042] ? add_to_page_cache_locked+0x40/0x40 [ 667.078055] blkdev_readpage+0x1d/0x30 [ 667.078064] do_read_cache_page+0x671/0xfc0 [ 667.131564] ? blkdev_writepages+0xd0/0xd0 [ 667.131578] ? find_get_pages_contig+0xaa0/0xaa0 [ 667.131585] ? blkdev_get+0xb0/0x8e0 [ 667.131594] ? dput.part.0+0x170/0x750 [ 667.131603] ? bd_may_claim+0xd0/0xd0 [ 667.131611] ? path_put+0x50/0x70 [ 667.131617] ? lookup_bdev.part.0+0xe1/0x160 [ 667.131626] read_cache_page_gfp+0x6e/0x90 [ 667.131637] btrfs_read_disk_super+0xdd/0x440 [ 667.131648] btrfs_scan_one_device+0xc6/0x400 [ 667.131659] ? device_list_add+0x8d0/0x8d0 [ 667.131667] ? __free_pages+0x54/0x90 23:27:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, 0x0, 0x0) [ 667.131676] ? free_pages+0x46/0x50 [ 667.131689] btrfs_mount+0x2e3/0x2b14 [ 667.131699] ? lock_downgrade+0x6e0/0x6e0 [ 667.131706] ? find_held_lock+0x35/0x130 [ 667.131716] ? pcpu_alloc+0x3af/0x1050 [ 667.131731] ? btrfs_remount+0x11f0/0x11f0 [ 667.131744] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.131761] ? __lockdep_init_map+0x10c/0x570 [ 667.131776] mount_fs+0x97/0x2a1 [ 667.131788] vfs_kern_mount.part.0+0x5e/0x3d0 [ 667.131795] ? find_held_lock+0x35/0x130 [ 667.131806] vfs_kern_mount+0x40/0x60 [ 667.131816] btrfs_mount+0x3ce/0x2b14 [ 667.131824] ? lock_downgrade+0x6e0/0x6e0 [ 667.131831] ? find_held_lock+0x35/0x130 [ 667.131840] ? pcpu_alloc+0x3af/0x1050 [ 667.131854] ? btrfs_remount+0x11f0/0x11f0 [ 667.131867] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.131885] ? __lockdep_init_map+0x10c/0x570 [ 667.131894] ? __lockdep_init_map+0x10c/0x570 [ 667.131906] mount_fs+0x97/0x2a1 [ 667.131917] vfs_kern_mount.part.0+0x5e/0x3d0 [ 667.131929] do_mount+0x417/0x27d0 [ 667.131937] ? copy_mount_options+0x5c/0x2f0 [ 667.131945] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.131956] ? copy_mount_string+0x40/0x40 [ 667.131969] ? copy_mount_options+0x1fe/0x2f0 [ 667.131980] SyS_mount+0xab/0x120 [ 667.131988] ? copy_mnt_ns+0x8c0/0x8c0 [ 667.131998] do_syscall_64+0x1e8/0x640 [ 667.132006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 667.132020] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 667.132026] RIP: 0033:0x45c27a [ 667.132031] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 667.132040] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a 23:27:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554", 0x4d) [ 667.132045] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 667.132050] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 667.132055] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 667.132059] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 667.152610] BTRFS error (device loop5): superblock checksum mismatch [ 667.180137] BTRFS error (device loop5): open_ctree failed 23:27:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) 23:27:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554", 0x4d) 23:27:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 667.406328] BTRFS error (device loop5): superblock checksum mismatch 23:27:00 executing program 2 (fault-call:3 fault-nth:72): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000100)={0x28, 0x3, 0x0, {0x1, 0x7, 0x0, 'selfem1'}}, 0x28) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000000c0)) 23:27:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) 23:27:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt(r0, 0x73, 0xfff, &(0x7f0000000200)=""/40, &(0x7f0000000240)=0x28) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x3a1401, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x80000000, 0x0, 0x4964def9}) [ 667.503270] BTRFS error (device loop5): open_ctree failed [ 667.514836] BTRFS error (device loop5): superblock checksum mismatch [ 667.522874] FAULT_INJECTION: forcing a failure. [ 667.522874] name failslab, interval 1, probability 0, space 0, times 0 [ 667.556080] CPU: 1 PID: 19322 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 667.563174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.563179] Call Trace: [ 667.563200] dump_stack+0x138/0x19c [ 667.563219] should_fail.cold+0x10f/0x159 [ 667.563232] ? __lock_is_held+0xb6/0x140 [ 667.563244] ? mempool_free+0x1d0/0x1d0 [ 667.563253] should_failslab+0xdb/0x130 [ 667.563265] kmem_cache_alloc+0x47/0x780 [ 667.563281] ? mempool_free+0x1d0/0x1d0 [ 667.563289] mempool_alloc_slab+0x47/0x60 [ 667.563297] mempool_alloc+0x138/0x300 [ 667.563309] ? remove_element.isra.0+0x1b0/0x1b0 [ 667.563317] ? find_held_lock+0x35/0x130 [ 667.563326] ? create_empty_buffers+0x2d3/0x480 [ 667.563335] ? save_trace+0x290/0x290 [ 667.563348] bio_alloc_bioset+0x368/0x680 [ 667.563359] ? bvec_alloc+0x2e0/0x2e0 [ 667.575292] submit_bh_wbc+0xf6/0x720 [ 667.598969] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 667.598982] block_read_full_page+0x7a2/0x960 [ 667.598994] ? set_init_blocksize+0x220/0x220 [ 667.607067] ? __bread_gfp+0x290/0x290 [ 667.607079] ? add_to_page_cache_lru+0x159/0x310 [ 667.607089] ? add_to_page_cache_locked+0x40/0x40 [ 667.624365] blkdev_readpage+0x1d/0x30 [ 667.624373] do_read_cache_page+0x671/0xfc0 [ 667.624382] ? blkdev_writepages+0xd0/0xd0 [ 667.628890] Unknown ioctl 22025 [ 667.632281] ? find_get_pages_contig+0xaa0/0xaa0 [ 667.632290] ? blkdev_get+0xb0/0x8e0 [ 667.632299] ? dput.part.0+0x170/0x750 [ 667.632308] ? bd_may_claim+0xd0/0xd0 [ 667.632316] ? path_put+0x50/0x70 [ 667.632324] ? lookup_bdev.part.0+0xe1/0x160 [ 667.632334] read_cache_page_gfp+0x6e/0x90 [ 667.632346] btrfs_read_disk_super+0xdd/0x440 [ 667.632356] btrfs_scan_one_device+0xc6/0x400 [ 667.632367] ? device_list_add+0x8d0/0x8d0 [ 667.658130] ? __free_pages+0x54/0x90 [ 667.667783] ? free_pages+0x46/0x50 [ 667.667797] btrfs_mount+0x2e3/0x2b14 [ 667.667807] ? lock_downgrade+0x6e0/0x6e0 [ 667.667816] ? find_held_lock+0x35/0x130 [ 667.743952] ? pcpu_alloc+0x3af/0x1050 [ 667.747814] ? btrfs_remount+0x11f0/0x11f0 [ 667.752033] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.757042] ? __lockdep_init_map+0x10c/0x570 [ 667.761516] mount_fs+0x97/0x2a1 [ 667.764854] vfs_kern_mount.part.0+0x5e/0x3d0 [ 667.769316] ? find_held_lock+0x35/0x130 [ 667.773360] vfs_kern_mount+0x40/0x60 [ 667.777143] btrfs_mount+0x3ce/0x2b14 [ 667.780922] ? lock_downgrade+0x6e0/0x6e0 [ 667.785044] ? find_held_lock+0x35/0x130 [ 667.789074] ? pcpu_alloc+0x3af/0x1050 [ 667.792941] ? btrfs_remount+0x11f0/0x11f0 [ 667.797150] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.802143] ? __lockdep_init_map+0x10c/0x570 [ 667.806606] ? __lockdep_init_map+0x10c/0x570 [ 667.811079] mount_fs+0x97/0x2a1 [ 667.814422] vfs_kern_mount.part.0+0x5e/0x3d0 [ 667.818890] do_mount+0x417/0x27d0 [ 667.822404] ? copy_mount_options+0x5c/0x2f0 [ 667.826780] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.831777] ? copy_mount_string+0x40/0x40 [ 667.835989] ? copy_mount_options+0x1fe/0x2f0 [ 667.840466] SyS_mount+0xab/0x120 [ 667.843998] ? copy_mnt_ns+0x8c0/0x8c0 [ 667.847859] do_syscall_64+0x1e8/0x640 [ 667.851723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 667.856556] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 667.861720] RIP: 0033:0x45c27a [ 667.864881] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 667.872565] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 667.879810] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 667.887049] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 667.894293] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 23:27:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) 23:27:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x3, 0x2) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x2c) r2 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) getpeername$netrom(r2, &(0x7f00000000c0)={{0x3, @bcast}, [@default, @netrom, @bcast, @default, @null, @null, @default, @default]}, &(0x7f0000000140)=0x48) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getpeername$netrom(r2, &(0x7f0000000180)={{0x3, @bcast}, [@netrom, @null, @remote, @bcast, @null, @default, @remote, @bcast]}, &(0x7f0000000200)=0x48) [ 667.901533] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:27:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804", 0x7b) 23:27:01 executing program 2 (fault-call:3 fault-nth:73): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 667.974057] BTRFS error (device loop5): open_ctree failed [ 667.983714] BTRFS error (device loop3): superblock checksum mismatch [ 668.002874] FAULT_INJECTION: forcing a failure. [ 668.002874] name failslab, interval 1, probability 0, space 0, times 0 [ 668.015133] CPU: 1 PID: 19349 Comm: syz-executor.2 Not tainted 4.14.139 #35 23:27:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0xaaaaaaaaaaaab78, &(0x7f0000000080), 0x8e044386b938bab7, 0x0) [ 668.015138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.015141] Call Trace: [ 668.015162] dump_stack+0x138/0x19c [ 668.015177] should_fail.cold+0x10f/0x159 [ 668.015186] ? __lock_is_held+0xb6/0x140 [ 668.015197] ? mempool_free+0x1d0/0x1d0 [ 668.015208] should_failslab+0xdb/0x130 [ 668.015218] kmem_cache_alloc+0x47/0x780 [ 668.015231] ? mempool_free+0x1d0/0x1d0 [ 668.015239] mempool_alloc_slab+0x47/0x60 [ 668.015249] mempool_alloc+0x138/0x300 [ 668.015260] ? remove_element.isra.0+0x1b0/0x1b0 [ 668.015268] ? find_held_lock+0x35/0x130 [ 668.015278] ? create_empty_buffers+0x2d3/0x480 [ 668.015287] ? save_trace+0x290/0x290 [ 668.015300] bio_alloc_bioset+0x368/0x680 23:27:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804", 0x7b) [ 668.015312] ? bvec_alloc+0x2e0/0x2e0 [ 668.015325] submit_bh_wbc+0xf6/0x720 [ 668.015335] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 668.015346] block_read_full_page+0x7a2/0x960 [ 668.015358] ? set_init_blocksize+0x220/0x220 [ 668.015370] ? __bread_gfp+0x290/0x290 [ 668.015379] ? add_to_page_cache_lru+0x159/0x310 [ 668.015389] ? add_to_page_cache_locked+0x40/0x40 [ 668.015401] blkdev_readpage+0x1d/0x30 [ 668.015409] do_read_cache_page+0x671/0xfc0 [ 668.015419] ? blkdev_writepages+0xd0/0xd0 [ 668.015433] ? find_get_pages_contig+0xaa0/0xaa0 [ 668.015441] ? blkdev_get+0xb0/0x8e0 [ 668.015450] ? dput.part.0+0x170/0x750 [ 668.015460] ? bd_may_claim+0xd0/0xd0 [ 668.015469] ? path_put+0x50/0x70 [ 668.015477] ? lookup_bdev.part.0+0xe1/0x160 [ 668.015486] read_cache_page_gfp+0x6e/0x90 [ 668.015498] btrfs_read_disk_super+0xdd/0x440 [ 668.015508] btrfs_scan_one_device+0xc6/0x400 [ 668.015519] ? device_list_add+0x8d0/0x8d0 [ 668.015528] ? __free_pages+0x54/0x90 [ 668.015537] ? free_pages+0x46/0x50 [ 668.015549] btrfs_mount+0x2e3/0x2b14 23:27:01 executing program 2 (fault-call:3 fault-nth:74): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:01 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xd5) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x8, [@broadcast, @random="d0b1b1151fd3", @empty, @random="9b8f1323a4d3", @dev={[], 0x1e}, @remote, @broadcast, @dev={[], 0x13}]}) [ 668.015558] ? lock_downgrade+0x6e0/0x6e0 [ 668.015565] ? find_held_lock+0x35/0x130 [ 668.015574] ? pcpu_alloc+0x3af/0x1050 [ 668.015589] ? btrfs_remount+0x11f0/0x11f0 [ 668.015602] ? rcu_read_lock_sched_held+0x110/0x130 [ 668.015620] ? __lockdep_init_map+0x10c/0x570 [ 668.015633] mount_fs+0x97/0x2a1 [ 668.015645] vfs_kern_mount.part.0+0x5e/0x3d0 [ 668.015652] ? find_held_lock+0x35/0x130 [ 668.015662] vfs_kern_mount+0x40/0x60 [ 668.015672] btrfs_mount+0x3ce/0x2b14 [ 668.015680] ? lock_downgrade+0x6e0/0x6e0 [ 668.015687] ? find_held_lock+0x35/0x130 [ 668.015696] ? pcpu_alloc+0x3af/0x1050 [ 668.015709] ? btrfs_remount+0x11f0/0x11f0 [ 668.015723] ? rcu_read_lock_sched_held+0x110/0x130 [ 668.015741] ? __lockdep_init_map+0x10c/0x570 [ 668.015751] ? __lockdep_init_map+0x10c/0x570 [ 668.015761] mount_fs+0x97/0x2a1 [ 668.015772] vfs_kern_mount.part.0+0x5e/0x3d0 [ 668.015784] do_mount+0x417/0x27d0 [ 668.015792] ? copy_mount_options+0x5c/0x2f0 [ 668.015800] ? rcu_read_lock_sched_held+0x110/0x130 [ 668.015811] ? copy_mount_string+0x40/0x40 [ 668.015824] ? copy_mount_options+0x1fe/0x2f0 [ 668.015836] SyS_mount+0xab/0x120 [ 668.015843] ? copy_mnt_ns+0x8c0/0x8c0 [ 668.015855] do_syscall_64+0x1e8/0x640 [ 668.015863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 668.015876] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 668.015883] RIP: 0033:0x45c27a [ 668.015888] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 668.015897] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 668.015903] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 668.015907] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 668.015912] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 668.015917] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 668.053001] BTRFS error (device loop3): open_ctree failed [ 668.060385] BTRFS error (device loop3): superblock checksum mismatch [ 668.129251] BTRFS error (device loop3): open_ctree failed [ 668.265231] BTRFS error (device loop3): superblock checksum mismatch [ 668.315635] FAULT_INJECTION: forcing a failure. [ 668.315635] name failslab, interval 1, probability 0, space 0, times 0 [ 668.326812] CPU: 0 PID: 19370 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 668.332695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.332700] Call Trace: [ 668.332715] dump_stack+0x138/0x19c [ 668.332733] should_fail.cold+0x10f/0x159 [ 668.332748] should_failslab+0xdb/0x130 [ 668.332761] kmem_cache_alloc_trace+0x2e9/0x790 [ 668.332772] ? __kmalloc_node+0x51/0x80 [ 668.332788] btrfs_mount+0x1001/0x2b14 [ 668.332799] ? lock_downgrade+0x6e0/0x6e0 [ 668.332808] ? find_held_lock+0x35/0x130 [ 668.332821] ? pcpu_alloc+0x3af/0x1050 [ 668.332838] ? btrfs_remount+0x11f0/0x11f0 [ 668.340126] ? rcu_read_lock_sched_held+0x110/0x130 [ 668.340145] ? __lockdep_init_map+0x10c/0x570 [ 668.340161] mount_fs+0x97/0x2a1 [ 668.348838] vfs_kern_mount.part.0+0x5e/0x3d0 [ 668.348846] ? find_held_lock+0x35/0x130 [ 668.348858] vfs_kern_mount+0x40/0x60 [ 668.379370] btrfs_mount+0x3ce/0x2b14 [ 668.379379] ? lock_downgrade+0x6e0/0x6e0 [ 668.379384] ? find_held_lock+0x35/0x130 [ 668.379394] ? pcpu_alloc+0x3af/0x1050 [ 668.386933] BTRFS error (device loop3): open_ctree failed [ 668.393888] ? btrfs_remount+0x11f0/0x11f0 [ 668.393901] ? rcu_read_lock_sched_held+0x110/0x130 [ 668.393918] ? __lockdep_init_map+0x10c/0x570 [ 668.393929] ? __lockdep_init_map+0x10c/0x570 [ 668.413165] mount_fs+0x97/0x2a1 [ 668.413181] vfs_kern_mount.part.0+0x5e/0x3d0 [ 668.413193] do_mount+0x417/0x27d0 [ 668.413204] ? copy_mount_options+0x5c/0x2f0 [ 668.425179] ? rcu_read_lock_sched_held+0x110/0x130 [ 668.425190] ? copy_mount_string+0x40/0x40 [ 668.425202] ? copy_mount_options+0x1fe/0x2f0 [ 668.425213] SyS_mount+0xab/0x120 [ 668.425226] ? copy_mnt_ns+0x8c0/0x8c0 [ 668.452786] do_syscall_64+0x1e8/0x640 [ 668.452796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 668.452812] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 668.452822] RIP: 0033:0x45c27a [ 668.458982] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 668.458992] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a 23:27:01 executing program 3: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804", 0x7b) [ 668.458997] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 668.459001] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 668.459007] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 668.650333] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:27:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) [ 668.682600] BTRFS error (device loop3): superblock checksum mismatch [ 668.770217] BTRFS error (device loop3): open_ctree failed [ 668.779335] BTRFS error (device loop1): superblock checksum mismatch 23:27:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x220000, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x0, 0x7}, 0x3da73335179e4c1b}, 0x10) r2 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1}) 23:27:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x27, 0x1, 0x1, 0x7, 0x8, 0x80000000, "7f944a658795b63ba1f2b805e3d72e49c55fc004fad410da1267106c33760d2285723f39729e6bcb9ed7fc6464b59be1338a7276e945631d080307207bacb4", 0x3}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000180)="c5a83908d8b6f66831b22310239e5633c14f4696624f0476", 0x18}, {&(0x7f00000001c0)="c5700e92ddeec67f064850e1c24df36524b91ca6ba60e02e08d9beaa592f7f36b355284fc6bed1eae1ffce610c3f67f1b3008c0662c96f558c892bfccd19ac869bf808e34d14c0b59714e794148ff5e55b367e6d54be590dfce76f25d070152b6fe4366eb19ad2bd2ec80f3b4327839402f1b60c0951c633c591a3f86de26fc2993c52e8244f26f2a1922f844216989f4e839f3c84f96d5eeff6ee5687d9a5ef68fac457e9da7d43c77fb1dd90fec29381cdbe8b0c26443b6dfddbe9d08445f5831321c317454bb51e56cbdde0c5ce2402c613b2e375f755ccf17beddd82b1a3b0845fb1e6634806d3706e5c3339e2", 0xef}], 0x2, 0x0, 0x0, 0x4000}, 0x40000) 23:27:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) 23:27:02 executing program 2 (fault-call:3 fault-nth:75): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380), 0x0) 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaa", 0x3e) [ 668.870271] BTRFS error (device loop1): open_ctree failed [ 668.935741] BTRFS error (device loop3): superblock checksum mismatch [ 668.944108] FAULT_INJECTION: forcing a failure. [ 668.944108] name failslab, interval 1, probability 0, space 0, times 0 [ 668.967207] CPU: 0 PID: 19409 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 668.974310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.983655] Call Trace: [ 668.983670] dump_stack+0x138/0x19c [ 668.983688] should_fail.cold+0x10f/0x159 [ 668.989851] should_failslab+0xdb/0x130 [ 668.989864] kmem_cache_alloc_node_trace+0x280/0x770 [ 668.989873] ? mutex_unlock+0xd/0x10 [ 668.989886] ? btrfs_scan_one_device+0xeb/0x400 [ 668.997965] __kmalloc_node+0x3d/0x80 [ 668.997977] kvmalloc_node+0x93/0xe0 [ 668.997987] btrfs_mount+0xf88/0x2b14 [ 668.997999] ? lock_downgrade+0x6e0/0x6e0 [ 669.022661] ? find_held_lock+0x35/0x130 [ 669.022673] ? pcpu_alloc+0x3af/0x1050 [ 669.022689] ? btrfs_remount+0x11f0/0x11f0 [ 669.022702] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.030869] ? __lockdep_init_map+0x10c/0x570 [ 669.030885] mount_fs+0x97/0x2a1 [ 669.030898] vfs_kern_mount.part.0+0x5e/0x3d0 [ 669.030905] ? find_held_lock+0x35/0x130 [ 669.030915] vfs_kern_mount+0x40/0x60 [ 669.030925] btrfs_mount+0x3ce/0x2b14 [ 669.030934] ? lock_downgrade+0x6e0/0x6e0 [ 669.072012] ? find_held_lock+0x35/0x130 [ 669.072024] ? pcpu_alloc+0x3af/0x1050 23:27:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 669.072039] ? btrfs_remount+0x11f0/0x11f0 [ 669.072053] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.072069] ? __lockdep_init_map+0x10c/0x570 [ 669.072078] ? __lockdep_init_map+0x10c/0x570 [ 669.072090] mount_fs+0x97/0x2a1 [ 669.072102] vfs_kern_mount.part.0+0x5e/0x3d0 [ 669.072113] do_mount+0x417/0x27d0 [ 669.072121] ? copy_mount_options+0x5c/0x2f0 [ 669.072128] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.072139] ? copy_mount_string+0x40/0x40 [ 669.072151] ? copy_mount_options+0x1fe/0x2f0 [ 669.072162] SyS_mount+0xab/0x120 23:27:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$9p(0xffffffffffffffff, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 669.072169] ? copy_mnt_ns+0x8c0/0x8c0 [ 669.072181] do_syscall_64+0x1e8/0x640 [ 669.072188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 669.072202] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 669.072208] RIP: 0033:0x45c27a [ 669.072212] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 669.072220] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 669.072225] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 669.072230] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 669.072234] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 669.072238] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 669.080994] BTRFS error (device loop3): open_ctree failed [ 669.084575] BTRFS error (device loop1): superblock checksum mismatch [ 669.242144] BTRFS error (device loop1): open_ctree failed [ 669.262086] BTRFS error (device loop1): superblock checksum mismatch 23:27:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000100)=0x8001) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) [ 669.301829] BTRFS error (device loop1): open_ctree failed [ 669.310907] BTRFS error (device loop1): superblock checksum mismatch 23:27:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0x2e, @dev={0xac, 0x14, 0x14, 0x2b}, 0x4e22, 0x0, 'none\x00', 0x1, 0x3, 0x68}, 0x2c) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000440)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r2}) 23:27:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaa", 0x3e) 23:27:02 executing program 2 (fault-call:3 fault-nth:76): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaa", 0x3e) [ 669.400209] BTRFS error (device loop1): open_ctree failed [ 669.407784] BTRFS error (device loop1): superblock checksum mismatch 23:27:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 669.452533] BTRFS error (device loop1): open_ctree failed [ 669.473498] BTRFS error (device loop5): superblock checksum mismatch 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba3", 0x5d) 23:27:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 669.499124] FAULT_INJECTION: forcing a failure. [ 669.499124] name failslab, interval 1, probability 0, space 0, times 0 23:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) [ 669.589414] CPU: 0 PID: 19459 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 669.596621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.605971] Call Trace: [ 669.608558] dump_stack+0x138/0x19c [ 669.612195] should_fail.cold+0x10f/0x159 [ 669.616351] should_failslab+0xdb/0x130 [ 669.620319] kmem_cache_alloc_trace+0x2e9/0x790 [ 669.624980] ? __kmalloc_node+0x51/0x80 [ 669.628934] btrfs_mount+0x1001/0x2b14 [ 669.632824] ? lock_downgrade+0x6e0/0x6e0 [ 669.632835] ? find_held_lock+0x35/0x130 [ 669.641014] ? pcpu_alloc+0x3af/0x1050 [ 669.641031] ? btrfs_remount+0x11f0/0x11f0 [ 669.641047] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.641065] ? __lockdep_init_map+0x10c/0x570 [ 669.641081] mount_fs+0x97/0x2a1 [ 669.641095] vfs_kern_mount.part.0+0x5e/0x3d0 [ 669.641102] ? find_held_lock+0x35/0x130 [ 669.641113] vfs_kern_mount+0x40/0x60 [ 669.641123] btrfs_mount+0x3ce/0x2b14 [ 669.641131] ? lock_downgrade+0x6e0/0x6e0 [ 669.641138] ? find_held_lock+0x35/0x130 [ 669.641146] ? pcpu_alloc+0x3af/0x1050 [ 669.641161] ? btrfs_remount+0x11f0/0x11f0 [ 669.641173] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.641192] ? __lockdep_init_map+0x10c/0x570 [ 669.641201] ? __lockdep_init_map+0x10c/0x570 [ 669.641224] mount_fs+0x97/0x2a1 [ 669.641235] vfs_kern_mount.part.0+0x5e/0x3d0 [ 669.641244] do_mount+0x417/0x27d0 [ 669.641252] ? copy_mount_options+0x5c/0x2f0 [ 669.641259] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.641270] ? copy_mount_string+0x40/0x40 [ 669.641281] ? copy_mount_options+0x1fe/0x2f0 [ 669.641291] SyS_mount+0xab/0x120 [ 669.641298] ? copy_mnt_ns+0x8c0/0x8c0 [ 669.641310] do_syscall_64+0x1e8/0x640 [ 669.641317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 669.641331] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 669.641338] RIP: 0033:0x45c27a [ 669.641342] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 669.641351] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 669.641355] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 669.641360] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 669.641364] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 669.641369] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 669.643125] BTRFS error (device loop5): open_ctree failed [ 669.651532] BTRFS error (device loop3): superblock checksum mismatch 23:27:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) 23:27:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) 23:27:03 executing program 2 (fault-call:3 fault-nth:77): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:03 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa1", 0x3f) [ 669.840169] BTRFS error (device loop3): open_ctree failed [ 669.849231] BTRFS error (device loop3): superblock checksum mismatch [ 669.873236] IPVS: set_ctl: invalid protocol: 46 172.20.20.43:20002 23:27:03 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 669.966273] BTRFS error (device loop3): open_ctree failed [ 669.985612] FAULT_INJECTION: forcing a failure. [ 669.985612] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 669.986169] BTRFS error (device loop5): superblock checksum mismatch [ 669.997409] CPU: 0 PID: 19511 Comm: syz-executor.2 Not tainted 4.14.139 #35 23:27:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 669.997417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.997420] Call Trace: [ 669.997435] dump_stack+0x138/0x19c [ 669.997451] should_fail.cold+0x10f/0x159 [ 669.997467] __alloc_pages_nodemask+0x1d6/0x7a0 [ 670.035451] ? fs_reclaim_acquire+0x20/0x20 [ 670.035461] ? __alloc_pages_slowpath+0x2930/0x2930 [ 670.035481] cache_grow_begin+0x80/0x400 [ 670.035490] kmem_cache_alloc_trace+0x6b2/0x790 [ 670.035504] btrfs_mount+0x1001/0x2b14 [ 670.035512] ? lock_downgrade+0x6e0/0x6e0 [ 670.035518] ? find_held_lock+0x35/0x130 [ 670.035527] ? pcpu_alloc+0x3af/0x1050 [ 670.035538] ? btrfs_remount+0x11f0/0x11f0 [ 670.035550] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.035562] ? __lockdep_init_map+0x10c/0x570 [ 670.035574] mount_fs+0x97/0x2a1 [ 670.035585] vfs_kern_mount.part.0+0x5e/0x3d0 [ 670.035590] ? find_held_lock+0x35/0x130 [ 670.035598] vfs_kern_mount+0x40/0x60 23:27:03 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 670.035606] btrfs_mount+0x3ce/0x2b14 [ 670.035612] ? lock_downgrade+0x6e0/0x6e0 [ 670.035618] ? find_held_lock+0x35/0x130 [ 670.035625] ? pcpu_alloc+0x3af/0x1050 [ 670.035636] ? btrfs_remount+0x11f0/0x11f0 [ 670.035645] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.035658] ? __lockdep_init_map+0x10c/0x570 [ 670.035665] ? __lockdep_init_map+0x10c/0x570 [ 670.035673] mount_fs+0x97/0x2a1 [ 670.035682] vfs_kern_mount.part.0+0x5e/0x3d0 [ 670.035691] do_mount+0x417/0x27d0 [ 670.035697] ? copy_mount_options+0x5c/0x2f0 23:27:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setuid(0xee01) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x8000}]}, 0xc, 0x2) acct(0x0) socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 670.035703] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.035711] ? copy_mount_string+0x40/0x40 [ 670.035721] ? copy_mount_options+0x1fe/0x2f0 [ 670.035729] SyS_mount+0xab/0x120 [ 670.035735] ? copy_mnt_ns+0x8c0/0x8c0 [ 670.035745] do_syscall_64+0x1e8/0x640 [ 670.035751] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 670.035762] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 670.035768] RIP: 0033:0x45c27a [ 670.035771] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 670.035779] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 670.035782] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 670.035786] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 670.035790] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 670.035793] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 670.073776] BTRFS error (device loop5): open_ctree failed [ 670.083027] net_ratelimit: 26 callbacks suppressed [ 670.083031] protocol 88fb is buggy, dev hsr_slave_0 [ 670.091064] protocol 88fb is buggy, dev hsr_slave_1 23:27:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 670.091144] protocol 88fb is buggy, dev hsr_slave_0 [ 670.100647] protocol 88fb is buggy, dev hsr_slave_1 [ 670.124442] BTRFS error (device loop5): superblock checksum mismatch 23:27:03 executing program 2 (fault-call:3 fault-nth:78): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 670.317939] BTRFS error (device loop5): open_ctree failed [ 670.320103] protocol 88fb is buggy, dev hsr_slave_0 [ 670.328518] protocol 88fb is buggy, dev hsr_slave_1 [ 670.402802] BTRFS error (device loop3): superblock checksum mismatch 23:27:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RSTAT(r0, &(0x7f0000000100)={0x52, 0x7d, 0x1, {0x0, 0x4b, 0x727b, 0x0, {0x80, 0x3, 0x6}, 0x100000, 0x10001, 0x9, 0x5, 0x6, 'btrfs\x00', 0x6, 'btrfs\x00', 0x6, 'btrfs\x00', 0x6, 'btrfs\x00'}}, 0x52) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11e6a5055e0bcfe47bf07042d8156457ad175c4062e91a0b08e17daa5479d0594a99077cafc32976") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x301000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x7c, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa2}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 670.460291] BTRFS error (device loop3): open_ctree failed [ 670.480331] FAULT_INJECTION: forcing a failure. [ 670.480331] name failslab, interval 1, probability 0, space 0, times 0 [ 670.504657] CPU: 0 PID: 19544 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 670.511756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.511761] Call Trace: [ 670.511776] dump_stack+0x138/0x19c [ 670.511793] should_fail.cold+0x10f/0x159 [ 670.511808] should_failslab+0xdb/0x130 [ 670.511819] kmem_cache_alloc+0x2d7/0x780 [ 670.511828] ? save_stack_trace+0x16/0x20 [ 670.511837] ? save_stack+0x45/0xd0 [ 670.531449] ? kasan_kmalloc+0xce/0xf0 [ 670.531459] ? kmem_cache_alloc_trace+0x152/0x790 [ 670.531469] ? btrfs_mount+0x1069/0x2b14 [ 670.531476] ? mount_fs+0x97/0x2a1 [ 670.531486] getname_kernel+0x53/0x350 [ 670.531500] kern_path+0x20/0x40 [ 670.555987] lookup_bdev.part.0+0x63/0x160 [ 670.555995] ? blkdev_open+0x260/0x260 [ 670.556006] ? btrfs_open_devices+0x27/0xb0 [ 670.556016] blkdev_get_by_path+0x76/0xf0 [ 670.556027] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 670.563576] __btrfs_open_devices+0x194/0xab0 [ 670.563588] ? check_preemption_disabled+0x3c/0x250 [ 670.563600] ? find_device+0x100/0x100 [ 670.563608] ? btrfs_mount+0x1069/0x2b14 [ 670.563620] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.614057] btrfs_open_devices+0xa4/0xb0 [ 670.618177] btrfs_mount+0x11b4/0x2b14 [ 670.622042] ? lock_downgrade+0x6e0/0x6e0 [ 670.626164] ? find_held_lock+0x35/0x130 [ 670.630195] ? pcpu_alloc+0x3af/0x1050 [ 670.634055] ? btrfs_remount+0x11f0/0x11f0 [ 670.638264] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.643252] ? __lockdep_init_map+0x10c/0x570 [ 670.647722] mount_fs+0x97/0x2a1 [ 670.651067] vfs_kern_mount.part.0+0x5e/0x3d0 [ 670.655536] ? find_held_lock+0x35/0x130 [ 670.659566] vfs_kern_mount+0x40/0x60 [ 670.663340] btrfs_mount+0x3ce/0x2b14 [ 670.667108] ? lock_downgrade+0x6e0/0x6e0 [ 670.671223] ? find_held_lock+0x35/0x130 [ 670.675262] ? pcpu_alloc+0x3af/0x1050 [ 670.679129] ? btrfs_remount+0x11f0/0x11f0 [ 670.683335] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.688324] ? __lockdep_init_map+0x10c/0x570 [ 670.692792] ? __lockdep_init_map+0x10c/0x570 [ 670.697262] mount_fs+0x97/0x2a1 [ 670.700598] vfs_kern_mount.part.0+0x5e/0x3d0 [ 670.705063] do_mount+0x417/0x27d0 [ 670.708577] ? copy_mount_options+0x5c/0x2f0 [ 670.712963] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.717953] ? copy_mount_string+0x40/0x40 [ 670.722161] ? copy_mount_options+0x1fe/0x2f0 [ 670.726627] SyS_mount+0xab/0x120 [ 670.730066] ? copy_mnt_ns+0x8c0/0x8c0 [ 670.733938] do_syscall_64+0x1e8/0x640 [ 670.737801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 670.742617] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 670.747775] RIP: 0033:0x45c27a [ 670.750934] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:27:04 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r0, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 670.758609] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 670.765847] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 670.773088] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 670.780334] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 670.787580] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 670.800150] protocol 88fb is buggy, dev hsr_slave_0 [ 670.805199] protocol 88fb is buggy, dev hsr_slave_1 23:27:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637b", 0x56) 23:27:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637b", 0x56) [ 670.810298] protocol 88fb is buggy, dev hsr_slave_0 [ 670.815339] protocol 88fb is buggy, dev hsr_slave_1 [ 670.830660] BTRFS error (device loop1): superblock checksum mismatch 23:27:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637b", 0x56) 23:27:04 executing program 2 (fault-call:3 fault-nth:79): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 670.870853] BTRFS error (device loop1): open_ctree failed [ 670.879549] BTRFS error (device loop1): superblock checksum mismatch 23:27:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 670.940280] BTRFS error (device loop1): open_ctree failed [ 670.955667] BTRFS error (device loop1): superblock checksum mismatch [ 671.052018] BTRFS error (device loop1): open_ctree failed [ 671.059334] BTRFS error (device loop1): superblock checksum mismatch [ 671.110455] FAULT_INJECTION: forcing a failure. [ 671.110455] name failslab, interval 1, probability 0, space 0, times 0 [ 671.122233] CPU: 0 PID: 19589 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 671.129340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.138669] Call Trace: [ 671.141241] dump_stack+0x138/0x19c [ 671.141255] should_fail.cold+0x10f/0x159 [ 671.141267] should_failslab+0xdb/0x130 [ 671.141277] kmem_cache_alloc_node+0x287/0x780 [ 671.157489] __alloc_skb+0x9c/0x500 [ 671.161085] ? skb_scrub_packet+0x4b0/0x4b0 [ 671.165381] ? netlink_has_listeners+0x20a/0x330 [ 671.170122] kobject_uevent_env+0x781/0xc23 [ 671.174428] kobject_uevent+0x20/0x26 [ 671.178207] loop_clr_fd+0x4a7/0xae0 [ 671.181894] lo_ioctl+0x8ea/0x1ce0 [ 671.185410] ? SyS_mount+0xcf/0x120 [ 671.189005] ? loop_probe+0x160/0x160 [ 671.192781] blkdev_ioctl+0x96b/0x1860 [ 671.196641] ? blkpg_ioctl+0x980/0x980 [ 671.200500] ? __might_sleep+0x93/0xb0 [ 671.204356] ? __fget+0x210/0x370 [ 671.207783] block_ioctl+0xde/0x120 [ 671.211378] ? blkdev_fallocate+0x3b0/0x3b0 [ 671.215666] do_vfs_ioctl+0x7ae/0x1060 [ 671.219524] ? selinux_file_mprotect+0x5d0/0x5d0 [ 671.224247] ? lock_downgrade+0x6e0/0x6e0 [ 671.228368] ? ioctl_preallocate+0x1c0/0x1c0 [ 671.232751] ? __fget+0x237/0x370 [ 671.236191] ? security_file_ioctl+0x89/0xb0 [ 671.240568] SyS_ioctl+0x8f/0xc0 [ 671.243904] ? do_vfs_ioctl+0x1060/0x1060 [ 671.248022] do_syscall_64+0x1e8/0x640 [ 671.251879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 671.256693] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 671.261854] RIP: 0033:0x459697 [ 671.265017] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 671.272695] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 0000000000459697 [ 671.279947] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 671.287186] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 671.294428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 671.301668] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 671.309187] BTRFS error (device loop1): open_ctree failed [ 671.323644] BTRFS error (device loop1): superblock checksum mismatch [ 671.390179] BTRFS error (device loop1): open_ctree failed [ 671.397318] BTRFS error (device loop1): superblock checksum mismatch 23:27:04 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x80, 0x80000) connect$bt_rfcomm(r0, &(0x7f0000000180)={0x1f, {0x83200, 0x1f, 0x800, 0x0, 0x89, 0x5}, 0xc20}, 0xa) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b", 0x5a) 23:27:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:04 executing program 2 (fault-call:3 fault-nth:80): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/autofs\x00', 0x40001, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) clock_adjtime(0x6, &(0x7f0000000e80)={0xffffffffffffff26, 0x6, 0x3ff, 0x100, 0x40, 0x40000000000000, 0x10001, 0xad4f, 0x5, 0x5, 0x80000000, 0x5, 0x6, 0x9, 0x0, 0x6, 0x3f, 0x0, 0x7ff, 0x3, 0xffff, 0xfff, 0x6, 0x5, 0x400, 0x4}) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000880)={0x0, 0x0}) r14 = fcntl$dupfd(r0, 0x406, r1) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000c40)={0xfffffffffffeffff}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r14, 0x84, 0x21, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000c00)=0x8) getresuid(&(0x7f00000009c0)=0x0, &(0x7f0000000a00), &(0x7f0000000a40)) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r14, 0x111, 0x3, 0x1, 0x4) ioctl$TCFLSH(r1, 0x540b, 0x1) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r14, 0x84, 0xc, &(0x7f0000000c80)=0x7ff, 0x4) sendmsg$netlink(r1, &(0x7f0000000cc0)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfd, 0x44d39eb71fe42145}, 0xc, &(0x7f0000000380)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="100200001700050000007000ffdbdf250c0026000000000004000b700800ff07", @ANYRES32=r2, @ANYBLOB='\b\x00`\x00', @ANYRES32=r3, @ANYBLOB="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"], 0x210}], 0x1, &(0x7f0000000d00)=ANY=[@ANYBLOB="b1897f310627811d5c9a899227702dfcc2882070", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB='\x00\x00\x00\x00'], 0x150, 0x40}, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 671.480152] BTRFS error (device loop1): open_ctree failed [ 671.503705] BTRFS error (device loop5): superblock checksum mismatch [ 671.518998] FAULT_INJECTION: forcing a failure. [ 671.518998] name failslab, interval 1, probability 0, space 0, times 0 [ 671.553507] CPU: 1 PID: 19619 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 671.560603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.569940] Call Trace: [ 671.572523] dump_stack+0x138/0x19c [ 671.576151] should_fail.cold+0x10f/0x159 [ 671.580293] should_failslab+0xdb/0x130 [ 671.584254] kmem_cache_alloc+0x2d7/0x780 [ 671.584264] ? save_stack_trace+0x16/0x20 [ 671.584270] ? save_stack+0x45/0xd0 [ 671.584276] ? kasan_kmalloc+0xce/0xf0 [ 671.584282] ? kmem_cache_alloc_trace+0x152/0x790 [ 671.584293] ? btrfs_mount+0x1069/0x2b14 [ 671.592532] ? mount_fs+0x97/0x2a1 [ 671.592545] getname_kernel+0x53/0x350 [ 671.592557] kern_path+0x20/0x40 [ 671.592568] lookup_bdev.part.0+0x63/0x160 [ 671.592576] ? blkdev_open+0x260/0x260 [ 671.592587] ? btrfs_open_devices+0x27/0xb0 [ 671.592598] blkdev_get_by_path+0x76/0xf0 [ 671.592609] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 671.592622] __btrfs_open_devices+0x194/0xab0 [ 671.592635] ? check_preemption_disabled+0x3c/0x250 [ 671.592650] ? find_device+0x100/0x100 23:27:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3", 0x57) [ 671.604928] ? btrfs_mount+0x1069/0x2b14 [ 671.604940] ? rcu_read_lock_sched_held+0x110/0x130 [ 671.604954] btrfs_open_devices+0xa4/0xb0 [ 671.604963] btrfs_mount+0x11b4/0x2b14 [ 671.612517] ? lock_downgrade+0x6e0/0x6e0 [ 671.612525] ? find_held_lock+0x35/0x130 [ 671.612537] ? pcpu_alloc+0x3af/0x1050 [ 671.612553] ? btrfs_remount+0x11f0/0x11f0 [ 671.612568] ? rcu_read_lock_sched_held+0x110/0x130 [ 671.612589] ? __lockdep_init_map+0x10c/0x570 [ 671.612606] mount_fs+0x97/0x2a1 23:27:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 671.700158] vfs_kern_mount.part.0+0x5e/0x3d0 [ 671.700169] ? find_held_lock+0x35/0x130 [ 671.708681] vfs_kern_mount+0x40/0x60 [ 671.708692] btrfs_mount+0x3ce/0x2b14 [ 671.716259] ? lock_downgrade+0x6e0/0x6e0 [ 671.716269] ? find_held_lock+0x35/0x130 [ 671.724436] ? pcpu_alloc+0x3af/0x1050 [ 671.724450] ? btrfs_remount+0x11f0/0x11f0 [ 671.724462] ? rcu_read_lock_sched_held+0x110/0x130 [ 671.724477] ? __lockdep_init_map+0x10c/0x570 [ 671.742042] ? __lockdep_init_map+0x10c/0x570 [ 671.742054] mount_fs+0x97/0x2a1 [ 671.749865] vfs_kern_mount.part.0+0x5e/0x3d0 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816", 0x54) [ 671.749879] do_mount+0x417/0x27d0 [ 671.757870] ? copy_mount_options+0x5c/0x2f0 [ 671.757879] ? rcu_read_lock_sched_held+0x110/0x130 [ 671.757890] ? copy_mount_string+0x40/0x40 [ 671.757903] ? copy_mount_options+0x1fe/0x2f0 [ 671.757915] SyS_mount+0xab/0x120 [ 671.757922] ? copy_mnt_ns+0x8c0/0x8c0 [ 671.757934] do_syscall_64+0x1e8/0x640 [ 671.757942] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 671.757956] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 671.757963] RIP: 0033:0x45c27a [ 671.757967] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 671.757977] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 671.757982] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 671.757987] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 671.757991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 671.757996] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 671.758280] BTRFS error (device loop5): open_ctree failed 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b", 0x51) 23:27:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 671.855582] BTRFS error (device loop1): superblock checksum mismatch [ 671.900635] BTRFS error (device loop1): open_ctree failed [ 671.920984] BTRFS error (device loop1): superblock checksum mismatch [ 672.002572] BTRFS error (device loop1): open_ctree failed [ 672.037781] BTRFS error (device loop3): superblock checksum mismatch 23:27:05 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x7, 0x10000) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000140)={0x800, 0x6, 0x1200, 0x3ff, 0x4, 0x8, 0x401, 0x8, 0x7, 0x400, 0x4, 0xffffffffffffff01}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x20000, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0xfffd}], 0xf43, 0x0) 23:27:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:05 executing program 2 (fault-call:3 fault-nth:81): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b", 0x51) 23:27:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sync_file_range(r0, 0x0, 0xfffffffffffffbff, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x8}], 0xf43, 0x0) 23:27:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b", 0x51) 23:27:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 672.100421] BTRFS error (device loop3): open_ctree failed 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b5678", 0x53) [ 672.178205] BTRFS error (device loop5): superblock checksum mismatch 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b5678", 0x53) 23:27:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 672.220133] BTRFS error (device loop5): open_ctree failed [ 672.241187] FAULT_INJECTION: forcing a failure. [ 672.241187] name failslab, interval 1, probability 0, space 0, times 0 [ 672.301563] CPU: 0 PID: 19668 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 672.308755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.308760] Call Trace: [ 672.308775] dump_stack+0x138/0x19c [ 672.308792] should_fail.cold+0x10f/0x159 [ 672.324392] should_failslab+0xdb/0x130 [ 672.332476] __kmalloc+0x2f0/0x7a0 [ 672.332487] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 672.332499] ? kobject_uevent_env+0x378/0xc23 [ 672.345928] ? rcu_read_lock_sched_held+0x110/0x130 [ 672.350934] ? kobject_get_path+0xbb/0x1a0 [ 672.350945] kobject_get_path+0xbb/0x1a0 [ 672.350956] ? devm_device_remove_groups+0x50/0x50 [ 672.350965] kobject_uevent_env+0x39c/0xc23 [ 672.350976] ? lock_downgrade+0x6e0/0x6e0 [ 672.359235] kobject_uevent+0x20/0x26 [ 672.376368] loop_clr_fd+0x4a7/0xae0 [ 672.377592] BTRFS error (device loop5): superblock checksum mismatch [ 672.380077] lo_ioctl+0x8ea/0x1ce0 [ 672.380090] ? SyS_mount+0xcf/0x120 [ 672.380099] ? loop_probe+0x160/0x160 [ 672.380111] blkdev_ioctl+0x96b/0x1860 [ 672.401330] ? blkpg_ioctl+0x980/0x980 [ 672.405201] ? __might_sleep+0x93/0xb0 [ 672.409063] ? __fget+0x210/0x370 [ 672.412503] block_ioctl+0xde/0x120 [ 672.416111] ? blkdev_fallocate+0x3b0/0x3b0 [ 672.420410] do_vfs_ioctl+0x7ae/0x1060 [ 672.424276] ? selinux_file_mprotect+0x5d0/0x5d0 [ 672.429009] ? lock_downgrade+0x6e0/0x6e0 [ 672.433140] ? ioctl_preallocate+0x1c0/0x1c0 [ 672.437623] ? __fget+0x237/0x370 [ 672.441059] ? security_file_ioctl+0x89/0xb0 [ 672.445447] SyS_ioctl+0x8f/0xc0 [ 672.448789] ? do_vfs_ioctl+0x1060/0x1060 [ 672.452920] do_syscall_64+0x1e8/0x640 [ 672.456786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 672.461607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 672.466774] RIP: 0033:0x459697 [ 672.469942] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 672.477628] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 0000000000459697 [ 672.484872] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 672.492119] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 23:27:05 executing program 3: stat(&(0x7f0000000700)='./file0/../file0\x00', &(0x7f0000000740)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() r3 = geteuid() stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) r8 = getgid() lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x4, r2}, {0x2, 0x1, r3}, {0x2, 0x7, r4}, {0x2, 0x1, r5}, {0x2, 0x7, r6}], {0x4, 0x6}, [{0x8, 0x4, r7}, {0x8, 0x4, r8}], {0x10, 0x1}, {0x20, 0x4}}, 0x6c, 0x2) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) r1 = geteuid() syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x101, 0x0, &(0x7f0000000140), 0x2000000, &(0x7f0000000180)=ANY=[@ANYBLOB="7468726561645f706f6f6c3d3078303030303030303030303030303030342c636f6d6d69743d3078303030303030303030303030303030332c6e6f696e6f64655f63616368652c736d61636b6673666c6f6f723d70726f637d6c6f5c5d766d6e6574312d7b7b766d6e657430657468307b776c616e312c646f6e745f61707072616973652c66736e616d653d7b275d2e6b657972696e676d643573756d2c736d61636b66737472616e736d7574653d6367726f8d702c6673757569643d3f33327f006332352d357f64662d303d61372d386636312d317665303b6539302c666f776e65723c", @ANYRESDEC=r1, @ANYBLOB=',dont_appraise,\x00']) [ 672.499365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 672.506612] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 23:27:05 executing program 2 (fault-call:3 fault-nth:82): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b5678", 0x53) 23:27:05 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000100)={0x1000000000000, 0xfffffffffffffc1f, 0x582dba7b, 0x9}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 672.567642] BTRFS error (device loop5): open_ctree failed [ 672.598439] BTRFS error (device loop1): superblock checksum mismatch [ 672.655539] FAULT_INJECTION: forcing a failure. [ 672.655539] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 672.667442] CPU: 1 PID: 19726 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 672.674557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.674561] Call Trace: [ 672.674575] dump_stack+0x138/0x19c [ 672.674593] should_fail.cold+0x10f/0x159 [ 672.674611] __alloc_pages_nodemask+0x1d6/0x7a0 [ 672.674625] ? __alloc_pages_slowpath+0x2930/0x2930 [ 672.674647] cache_grow_begin+0x80/0x400 [ 672.690185] kmem_cache_alloc+0x6a6/0x780 [ 672.690194] ? save_stack_trace+0x16/0x20 [ 672.690201] ? save_stack+0x45/0xd0 [ 672.690209] ? kmem_cache_alloc_trace+0x152/0x790 [ 672.690219] getname_kernel+0x53/0x350 [ 672.690227] kern_path+0x20/0x40 [ 672.690237] lookup_bdev.part.0+0x63/0x160 [ 672.690244] ? blkdev_open+0x260/0x260 [ 672.690254] ? btrfs_open_devices+0x27/0xb0 [ 672.690263] blkdev_get_by_path+0x76/0xf0 [ 672.699046] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 672.699058] __btrfs_open_devices+0x194/0xab0 [ 672.699068] ? check_preemption_disabled+0x3c/0x250 [ 672.699079] ? find_device+0x100/0x100 [ 672.720006] ? btrfs_mount+0x1069/0x2b14 [ 672.720018] ? rcu_read_lock_sched_held+0x110/0x130 [ 672.720032] btrfs_open_devices+0xa4/0xb0 [ 672.720041] btrfs_mount+0x11b4/0x2b14 [ 672.720050] ? lock_downgrade+0x6e0/0x6e0 [ 672.720057] ? find_held_lock+0x35/0x130 [ 672.720068] ? pcpu_alloc+0x3af/0x1050 [ 672.720083] ? btrfs_remount+0x11f0/0x11f0 [ 672.720094] ? rcu_read_lock_sched_held+0x110/0x130 23:27:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 672.720109] ? __lockdep_init_map+0x10c/0x570 [ 672.728799] mount_fs+0x97/0x2a1 [ 672.728812] vfs_kern_mount.part.0+0x5e/0x3d0 [ 672.728819] ? find_held_lock+0x35/0x130 [ 672.728829] vfs_kern_mount+0x40/0x60 [ 672.825086] btrfs_mount+0x3ce/0x2b14 [ 672.825095] ? lock_downgrade+0x6e0/0x6e0 [ 672.825101] ? find_held_lock+0x35/0x130 [ 672.825112] ? pcpu_alloc+0x3af/0x1050 [ 672.840963] ? btrfs_remount+0x11f0/0x11f0 23:27:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2900, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000180)=0xfeb) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x10, 0x0) [ 672.840980] ? rcu_read_lock_sched_held+0x110/0x130 [ 672.840997] ? __lockdep_init_map+0x10c/0x570 [ 672.841007] ? __lockdep_init_map+0x10c/0x570 [ 672.841020] mount_fs+0x97/0x2a1 [ 672.841033] vfs_kern_mount.part.0+0x5e/0x3d0 [ 672.841044] do_mount+0x417/0x27d0 [ 672.841053] ? retint_kernel+0x2d/0x2d [ 672.841066] ? copy_mount_string+0x40/0x40 [ 672.841076] ? copy_mount_options+0x199/0x2f0 [ 672.841086] ? copy_mount_options+0x1fe/0x2f0 [ 672.841097] SyS_mount+0xab/0x120 [ 672.841104] ? copy_mnt_ns+0x8c0/0x8c0 [ 672.841116] do_syscall_64+0x1e8/0x640 [ 672.841124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 672.841136] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 672.841143] RIP: 0033:0x45c27a [ 672.841147] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 672.841156] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 672.841161] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 23:27:06 executing program 2 (fault-call:3 fault-nth:83): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 672.841166] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 672.841170] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 672.841175] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 672.847268] BTRFS error (device loop1): open_ctree failed [ 672.854883] BTRFS error (device loop5): superblock checksum mismatch [ 672.944785] BTRFS error (device loop5): open_ctree failed 23:27:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3", 0x57) 23:27:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 673.022205] BTRFS error (device loop5): superblock checksum mismatch 23:27:06 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RSTAT(r0, &(0x7f0000000100)={0x52, 0x7d, 0x1, {0x0, 0x4b, 0x727b, 0x0, {0x80, 0x3, 0x6}, 0x100000, 0x10001, 0x9, 0x5, 0x6, 'btrfs\x00', 0x6, 'btrfs\x00', 0x6, 'btrfs\x00', 0x6, 'btrfs\x00'}}, 0x52) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000240)) ioctl(r0, 0x8, &(0x7f0000000280)="11dca5055e0bcfe47bf070") r3 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x2000f43, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r3, 0x4}, {r3, 0x600}, {r3, 0x10}, {r2, 0x8180}, {r2, 0x2000}, {0xffffffffffffffff, 0x10000010c}], 0x6, &(0x7f0000000140)={r4, r5+30000000}, &(0x7f00000001c0)={0xff}, 0x8) [ 673.121156] FAULT_INJECTION: forcing a failure. [ 673.121156] name failslab, interval 1, probability 0, space 0, times 0 [ 673.121998] BTRFS error (device loop5): open_ctree failed [ 673.137351] CPU: 0 PID: 19756 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 673.145156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.145161] Call Trace: [ 673.145176] dump_stack+0x138/0x19c [ 673.145197] should_fail.cold+0x10f/0x159 [ 673.145216] should_failslab+0xdb/0x130 [ 673.160730] kmem_cache_alloc_node+0x287/0x780 [ 673.160747] __alloc_skb+0x9c/0x500 [ 673.160756] ? skb_scrub_packet+0x4b0/0x4b0 [ 673.160766] ? netlink_has_listeners+0x20a/0x330 [ 673.160777] kobject_uevent_env+0x781/0xc23 [ 673.160791] kobject_uevent+0x20/0x26 [ 673.168957] loop_clr_fd+0x4a7/0xae0 [ 673.168970] lo_ioctl+0x8ea/0x1ce0 [ 673.168982] ? SyS_mount+0xcf/0x120 [ 673.168991] ? loop_probe+0x160/0x160 [ 673.169000] blkdev_ioctl+0x96b/0x1860 [ 673.169010] ? blkpg_ioctl+0x980/0x980 [ 673.181477] ? __might_sleep+0x93/0xb0 23:27:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11e6a5055e0bcfe47bf07042d8156457ad175c4062e91a0b08e17daa5479d0594a99077cafc32976") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x301000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x7c, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa2}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 673.181485] ? __fget+0x210/0x370 [ 673.181496] block_ioctl+0xde/0x120 [ 673.181505] ? blkdev_fallocate+0x3b0/0x3b0 [ 673.181513] do_vfs_ioctl+0x7ae/0x1060 [ 673.181524] ? selinux_file_mprotect+0x5d0/0x5d0 [ 673.181531] ? lock_downgrade+0x6e0/0x6e0 [ 673.181539] ? ioctl_preallocate+0x1c0/0x1c0 [ 673.190572] ? __fget+0x237/0x370 [ 673.190586] ? security_file_ioctl+0x89/0xb0 [ 673.190597] SyS_ioctl+0x8f/0xc0 [ 673.190604] ? do_vfs_ioctl+0x1060/0x1060 [ 673.190614] do_syscall_64+0x1e8/0x640 [ 673.190622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 673.190635] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 673.201629] RIP: 0033:0x459697 [ 673.201634] RSP: 002b:00007f3f2243da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 673.201644] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 0000000000459697 [ 673.201649] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 673.201654] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 673.201659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 673.201664] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 673.246747] BTRFS error (device loop5): superblock checksum mismatch [ 673.370266] BTRFS error (device loop5): open_ctree failed [ 673.377561] BTRFS error (device loop5): superblock checksum mismatch [ 673.432561] BTRFS error (device loop5): open_ctree failed [ 673.439947] BTRFS error (device loop5): superblock checksum mismatch 23:27:06 executing program 3: 23:27:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e62d362b567816637bb3f0af2b3a0ba35727fd5c3bfb079ac1fec6504aea2b8417347cb8bceeda5c0647ea020804e0022c11a9999ef2873d23ca4d208923eabde2540abc311a2147beab2634dba45e5124c3ac956bca0574341a22558446af9abf150db47bdf36ceac8b2cf25e3ab5b3b3320ebef5c2bc78b344e33a6210e485fb7c27fee41de6c72026621a56c21325ddbc9a652f5c4cff9a152fa60eb83ddb1b0833fc2d546f5848", 0xf6) 23:27:06 executing program 2 (fault-call:3 fault-nth:84): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:27:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) 23:27:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 23:27:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x8000, 0x203, 0xfffffffffffffff8, 0xa6, r2}, &(0x7f0000000180)=0x10) [ 673.500177] BTRFS error (device loop5): open_ctree failed 23:27:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 673.549319] FAULT_INJECTION: forcing a failure. [ 673.549319] name failslab, interval 1, probability 0, space 0, times 0 [ 673.572091] CPU: 1 PID: 19801 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 673.579214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.588557] Call Trace: [ 673.588574] dump_stack+0x138/0x19c [ 673.588590] should_fail.cold+0x10f/0x159 [ 673.598906] should_failslab+0xdb/0x130 [ 673.602877] kmem_cache_alloc_trace+0x2e9/0x790 [ 673.602886] ? mutex_trylock+0x1c0/0x1c0 [ 673.602899] ? btrfs_close_devices+0x21/0x140 [ 673.616073] btrfs_alloc_device+0xa4/0x6a0 [ 673.620626] ? btrfs_find_device_by_devspec+0xf0/0xf0 [ 673.620645] __btrfs_close_devices+0x2c6/0xa90 [ 673.620655] ? __mutex_unlock_slowpath+0x71/0x800 [ 673.620665] ? btrfs_alloc_device+0x6a0/0x6a0 [ 673.639717] btrfs_close_devices+0x29/0x140 [ 673.639728] btrfs_mount+0x1fc5/0x2b14 [ 673.639737] ? lock_downgrade+0x6e0/0x6e0 [ 673.639743] ? find_held_lock+0x35/0x130 [ 673.639756] ? pcpu_alloc+0x3af/0x1050 [ 673.659973] ? btrfs_remount+0x11f0/0x11f0 [ 673.664208] ? rcu_read_lock_sched_held+0x110/0x130 [ 673.669216] ? __lockdep_init_map+0x10c/0x570 [ 673.673911] mount_fs+0x97/0x2a1 [ 673.677259] vfs_kern_mount.part.0+0x5e/0x3d0 [ 673.681732] ? find_held_lock+0x35/0x130 [ 673.685770] vfs_kern_mount+0x40/0x60 [ 673.689550] btrfs_mount+0x3ce/0x2b14 [ 673.693349] ? lock_downgrade+0x6e0/0x6e0 [ 673.697481] ? find_held_lock+0x35/0x130 [ 673.701520] ? pcpu_alloc+0x3af/0x1050 [ 673.705386] ? btrfs_remount+0x11f0/0x11f0 [ 673.709600] ? rcu_read_lock_sched_held+0x110/0x130 [ 673.714597] ? __lockdep_init_map+0x10c/0x570 [ 673.719070] ? __lockdep_init_map+0x10c/0x570 [ 673.723541] mount_fs+0x97/0x2a1 [ 673.726886] vfs_kern_mount.part.0+0x5e/0x3d0 [ 673.731370] do_mount+0x417/0x27d0 [ 673.734895] ? copy_mount_options+0x5c/0x2f0 [ 673.739282] ? rcu_read_lock_sched_held+0x110/0x130 [ 673.744276] ? copy_mount_string+0x40/0x40 [ 673.748486] ? copy_mount_options+0x1fe/0x2f0 [ 673.752974] SyS_mount+0xab/0x120 [ 673.756416] ? copy_mnt_ns+0x8c0/0x8c0 [ 673.760294] do_syscall_64+0x1e8/0x640 [ 673.764351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 673.769263] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 673.774432] RIP: 0033:0x45c27a [ 673.777598] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 673.785369] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 673.792631] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 23:27:07 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x20, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x54) 23:27:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x82) write$9p(r1, &(0x7f0000000380)="4891d983e05d3466da52cb51e8a27b9610d1b15f9bc89e9d296dcaac4f09768161782bcfb4df358fefce5d9fc01b1cfbfe7f063d29c159f4a41f5aaaadaaa183d0c5e527c38de21cefffc87554e6", 0x4e) [ 673.799888] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 673.807136] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 673.814395] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 673.827803] ------------[ cut here ]------------ [ 673.832655] kernel BUG at fs/btrfs/volumes.c:890! [ 673.847503] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 673.852951] Modules linked in: [ 673.856129] CPU: 0 PID: 19801 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 673.863205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.872536] task: ffff888058be2640 task.stack: ffff8880552b0000 [ 673.878572] RIP: 0010:__btrfs_close_devices+0x7d8/0xa90 [ 673.883905] RSP: 0018:ffff8880552b7700 EFLAGS: 00010246 [ 673.889242] RAX: 0000000000040000 RBX: ffff88808b3ea000 RCX: ffffc9000a25f000 [ 673.896486] RDX: 0000000000040000 RSI: ffffffff8265b1f8 RDI: 0000000000000286 [ 673.903732] RBP: ffff8880552b77c8 R08: ffff888058be2640 R09: ffff888058be2f08 [ 673.910975] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88809609b080 [ 673.918220] R13: ffff88808b3ea0c8 R14: fffffffffffffff4 R15: dffffc0000000000 [ 673.925467] FS: 00007f3f2243e700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 673.933665] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 673.939521] CR2: 0000000000c09ca8 CR3: 000000009540e000 CR4: 00000000001426f0 [ 673.946768] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 673.954014] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 673.961256] Call Trace: [ 673.963819] ? __mutex_unlock_slowpath+0x71/0x800 [ 673.968636] ? btrfs_alloc_device+0x6a0/0x6a0 [ 673.973112] btrfs_close_devices+0x29/0x140 [ 673.977411] btrfs_mount+0x1fc5/0x2b14 [ 673.981274] ? lock_downgrade+0x6e0/0x6e0 [ 673.985395] ? find_held_lock+0x35/0x130 [ 673.989429] ? pcpu_alloc+0x3af/0x1050 [ 673.993388] ? btrfs_remount+0x11f0/0x11f0 [ 673.997600] ? rcu_read_lock_sched_held+0x110/0x130 [ 674.002592] ? __lockdep_init_map+0x10c/0x570 [ 674.007065] mount_fs+0x97/0x2a1 [ 674.010554] vfs_kern_mount.part.0+0x5e/0x3d0 [ 674.015025] ? find_held_lock+0x35/0x130 [ 674.019064] vfs_kern_mount+0x40/0x60 [ 674.022838] btrfs_mount+0x3ce/0x2b14 [ 674.026613] ? lock_downgrade+0x6e0/0x6e0 [ 674.030821] ? find_held_lock+0x35/0x130 [ 674.034889] ? pcpu_alloc+0x3af/0x1050 [ 674.038752] ? btrfs_remount+0x11f0/0x11f0 [ 674.042975] ? rcu_read_lock_sched_held+0x110/0x130 [ 674.047981] ? __lockdep_init_map+0x10c/0x570 [ 674.052463] ? __lockdep_init_map+0x10c/0x570 [ 674.056937] mount_fs+0x97/0x2a1 [ 674.060277] vfs_kern_mount.part.0+0x5e/0x3d0 [ 674.064752] do_mount+0x417/0x27d0 [ 674.068268] ? copy_mount_options+0x5c/0x2f0 [ 674.072656] ? rcu_read_lock_sched_held+0x110/0x130 [ 674.077647] ? copy_mount_string+0x40/0x40 [ 674.081855] ? copy_mount_options+0x1fe/0x2f0 [ 674.086327] SyS_mount+0xab/0x120 [ 674.089751] ? copy_mnt_ns+0x8c0/0x8c0 [ 674.093616] do_syscall_64+0x1e8/0x640 [ 674.097475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 674.102292] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 674.107456] RIP: 0033:0x45c27a [ 674.110619] RSP: 002b:00007f3f2243da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 674.118299] RAX: ffffffffffffffda RBX: 00007f3f2243db40 RCX: 000000000045c27a [ 674.125545] RDX: 00007f3f2243dae0 RSI: 0000000020000080 RDI: 00007f3f2243db00 [ 674.132792] RBP: 0000000000000001 R08: 00007f3f2243db40 R09: 00007f3f2243dae0 [ 674.140044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 674.147288] R13: 00000000004c8920 R14: 00000000004df7f8 R15: 0000000000000004 [ 674.154533] Code: c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 59 02 00 00 48 8b 45 80 c7 80 10 01 00 00 00 00 00 00 e9 e2 f8 ff ff e8 78 2b f7 fe <0f> 0b e8 71 2b f7 fe 0f 0b 48 89 f7 e8 07 d8 20 ff e9 ad f8 ff [ 674.173595] RIP: __btrfs_close_devices+0x7d8/0xa90 RSP: ffff8880552b7700 [ 674.182169] ---[ end trace 689b2f82e3f973ce ]--- [ 674.186915] Kernel panic - not syncing: Fatal exception [ 674.193403] Kernel Offset: disabled [ 674.197017] Rebooting in 86400 seconds..