903, &(0x7f0000000040)=0x0) rt_sigqueueinfo(r1, 0x36, &(0x7f0000000080)={0xa, 0x6, 0x6, 0x82}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/sctp\x00') 2018/06/05 09:47:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000003f00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:27 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020a080002000000000000000000493309e427669e68b687e47f5ec38adb2804950b5446aef90d036849271a482b4f32cf520ca8601546e9918adf270b9616033444dc08ee81209c7ee97137ca360454b01ed20dadb7b977ef316a7179a5b0c7d1e271530a6050f932ee33af3e331945916b89a3e0211d16f80a0003b6bb067dc8425994c2692d56a9c2357cf796f0ddefe6e4d320ecfe5319e4e33881476e742337be146d27652d9053cedcce51d3f773ec79a0c84651603c93674f5780fe6ddedfef8ab7dddff7439524a238499a9ed7d100000000"], 0xd6}, 0x1}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 2018/06/05 09:47:27 executing program 6: socketpair(0x1d, 0x0, 0x0, &(0x7f0000000500)) 2018/06/05 09:47:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\a') 2018/06/05 09:47:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x10) 2018/06/05 09:47:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x8000000) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) fdatasync(r3) fallocate(r1, 0x11, 0x2, 0xbc93) [ 706.421396] can: request_module (can-proto-0) failed. [ 706.504091] can: request_module (can-proto-0) failed. 2018/06/05 09:47:28 executing program 2: socketpair$inet6_udp(0xa, 0x2, 0x67010000, &(0x7f0000000200)) 2018/06/05 09:47:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8fffffffffffffd00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_vs\x00') r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000040)=0xca) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/sctp\x00') getsockname(r1, &(0x7f0000000080)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) pwritev(r0, &(0x7f00000002c0), 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x300, 0x70bd25, 0x25dfdbfc, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040041) ioctl$sock_bt_hci(r2, 0x400448cb, &(0x7f0000000000)="9c89ace3db97a8da3fbd1acb7b58d3c216a5406efe661863299fcea375") 2018/06/05 09:47:28 executing program 7: perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/06/05 09:47:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x10) 2018/06/05 09:47:28 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x59c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write(0x1, &(0x7f0000000100), 0x10) modify_ldt$write(0x1, &(0x7f0000000040), 0x10) 2018/06/05 09:47:28 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f000000a000)) stat(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000100)) 2018/06/05 09:47:28 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x0) 2018/06/05 09:47:28 executing program 6: r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}, 0x10) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005e0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 2018/06/05 09:47:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23}}, 0x6, 0x3ff}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)={r1, 0xde, "14a0fa090e568733722a9af7f1e610a368ec3c4af6b877ec4763cce049aa3478fc5ed66df6f8fb90e405ed3b3e1ecfa793eadb298952411a53b5084c82e74a002b9972476ceafa7f8dd3b7a844da072efb732960e641df5fc38aa2cb3a15d0633bb49c3efefd7134f8ea65a68800b2da11e04b79fc645b5190035ba1f9d3a3c5d7c531d06f4e8cb9874db2aefc9d3993beab51c814927f0592dbe7b767a8af2eff69d7e2a0e3648d53f144bc2e04cb4270c1e02cc354dc57438d24210b33cd839ecec901a1f5359f2a6bbcd96636194ada2a88326a9ede595622bd82ab22"}, &(0x7f00000001c0)=0xe6) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_vs\x00') socket$inet6(0xa, 0x3, 0x8) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000080)={r4, r5, 0xdf}) ioctl(r3, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_open_procfs(0x0, &(0x7f00000004c0)='net/sctp\x00') 2018/06/05 09:47:28 executing program 7: perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/06/05 09:47:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0400000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x19fff]}, 0x10) 2018/06/05 09:47:28 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f000000a000)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000480)) stat(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000100)) getegid() 2018/06/05 09:47:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_vs\x00') r1 = socket$kcm(0x29, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40010000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@deltfilter={0x48, 0x2d, 0x1, 0x70bd2a, 0x25dfdbfd, {0x0, r2, {0xe, 0x4fccc3937b05a5c5}, {0xfff3, 0xf}, {0x4, 0x10}}, [@TCA_RATE={0x8, 0x5, {0x6, 0xffffffffffff789e}}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0xc, 0x2, @TCA_BPF_FLAGS_GEN={0x8, 0x9}}}, @TCA_RATE={0x8, 0x5, {0x2}}]}, 0x48}, 0x1, 0x0, 0x0, 0xc040}, 0x90) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_open_procfs(0x0, &(0x7f00000004c0)='net/sctp\x00') 2018/06/05 09:47:28 executing program 7: perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/06/05 09:47:28 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000800000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x500000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bridge\x00', 0x10) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x27ffe) sendfile(r2, r3, &(0x7f0000001340), 0x8080400001) 2018/06/05 09:47:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xc]}, 0x10) 2018/06/05 09:47:28 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) recvmmsg(r0, &(0x7f0000002c80)=[{{&(0x7f0000000280)=@vsock={0x0, 0x0, 0x0, @my}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/154, 0x9a}], 0x1, &(0x7f0000000e80)=""/234, 0xea}}, {{&(0x7f0000000f80)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000001300)=[{&(0x7f00000012c0)=""/56, 0x38}], 0x1}, 0x148f}, {{&(0x7f0000001340)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001880)=[{&(0x7f00000013c0)=""/143, 0x8f}, {&(0x7f0000001480)=""/81, 0x51}, {&(0x7f0000001500)=""/245, 0xf5}, {&(0x7f0000001600)=""/175, 0xaf}, {&(0x7f00000016c0)=""/251, 0xfb}, {&(0x7f00000017c0)=""/104, 0x68}, {&(0x7f0000001840)=""/24, 0x18}, {&(0x7f0000001e80)=""/164, 0xa4}], 0x8, &(0x7f0000001f40)=""/251, 0xfb, 0x6}, 0x8}, {{&(0x7f0000002040)=@alg, 0x80, &(0x7f00000022c0)=[{&(0x7f00000020c0)=""/68, 0x44}, {&(0x7f0000002140)=""/194, 0xc2}, {&(0x7f0000002240)=""/108, 0x6c}, {&(0x7f00000018c0)=""/2, 0x2}], 0x4, &(0x7f0000002300)=""/72, 0x48}, 0x7}, {{&(0x7f0000002380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002500)=[{&(0x7f0000002400)=""/254, 0xfe}], 0x1, &(0x7f0000002540)=""/90, 0x5a, 0x3fd}, 0x7}, {{&(0x7f00000025c0)=@hci, 0x80, &(0x7f0000002880)=[{&(0x7f0000002640)=""/99, 0x63}, {&(0x7f00000026c0)=""/191, 0xbf}, {&(0x7f0000002780)=""/48, 0x30}, {&(0x7f00000027c0)=""/143, 0x8f}], 0x4, &(0x7f00000028c0), 0x0, 0x3}, 0xfffffffffffffffd}, {{&(0x7f0000002900)=@nfc, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002980)=""/194, 0xc2}, {&(0x7f0000002a80)=""/27, 0x1b}, {&(0x7f0000002ac0)=""/203, 0xcb}, {&(0x7f0000002bc0)=""/28, 0x1c}], 0x4, &(0x7f0000002c40)=""/56, 0x38, 0xfffffffeffffffff}}], 0x7, 0x0, &(0x7f0000002d80)={0x77359400}) write$binfmt_elf64(r0, &(0x7f0000001900)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000071ef4b8000040000000000000000000000000000000000000000000380000000000000000007edb0000000000000000000000000000000000000000000000000000000000000000000000000000b6060000000000000300000000000000d0170000000000000000000000000000000000000000000000000000000000000000000000000000c67e9b790000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028fb9553ce600000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000e02fe28e2e1816b82c516633c667fc560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007785703cbf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x55b) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x461) 2018/06/05 09:47:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc08c5332, &(0x7f0000dc5f98)) [ 707.024697] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop1 2018/06/05 09:47:28 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000200)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000380)=""/179, 0xb3}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f0000000f80)={&(0x7f00000007c0)=@in6={0xa, 0x0, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000840)="87", 0x1}], 0x1, &(0x7f0000000c40)}, 0x0) 2018/06/05 09:47:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000100000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x3000000000000000]}, 0x10) 2018/06/05 09:47:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 707.113331] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:47:28 executing program 6: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x0, &(0x7f0000781f70)) clone(0x88080000, &(0x7f00000000c0)="fe260792cc9424dd46104a357e70c3a7ce15669d2ec33bb3ff20174ea68e1f05", &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000440)) 2018/06/05 09:47:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000380)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x2, 0x2, 0x4, 0x2}) sendfile(r0, r0, &(0x7f00000000c0)=0x7000000, 0xdd) [ 707.173486] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000a00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 707.237933] BTRFS error (device loop1): superblock checksum mismatch [ 707.265227] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xb80b0000]}, 0x10) 2018/06/05 09:47:28 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') read(r2, &(0x7f0000000180)=""/230, 0xff4e) read$eventfd(r2, &(0x7f0000000000), 0x8) 2018/06/05 09:47:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000001700000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:29 executing program 0: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) clone(0x88081100, &(0x7f00000000c0), &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000440)) [ 707.576236] BTRFS error (device loop1): superblock checksum mismatch [ 707.619233] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 2018/06/05 09:47:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x3f1]}, 0x10) 2018/06/05 09:47:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0200000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:29 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000001c0)=""/248) uname(&(0x7f0000000100)=""/135) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffe4e, 0x0, &(0x7f00000000c0)={0x2}, 0x6) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'vcan0\x00'}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000002c0)=0x10) 2018/06/05 09:47:29 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0047fc2f07d82c99240970") pread64(r0, &(0x7f00000000c0)=""/4, 0x4, 0x0) 2018/06/05 09:47:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:29 executing program 0: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(0x0, &(0x7f0000000240)={0x3}, 0x2000, 0x800) 2018/06/05 09:47:29 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00005d4ff8), 0x2000000000000ff) [ 708.018206] IPVS: sync thread started: state = BACKUP, mcast_ifn = vcan0, syncid = 0, id = 0 [ 708.180650] BTRFS error (device loop1): superblock checksum mismatch [ 708.192900] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0020000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={"73797a5f74756e000300", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x66}}, @IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [], 0xaa}}]}, 0xff8d}, 0x1}, 0x0) 2018/06/05 09:47:29 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x4) lseek(r0, 0x0, 0x4) 2018/06/05 09:47:29 executing program 7: clone(0x200, &(0x7f0000000000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f00000000c0)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000775000)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') pread64(r0, &(0x7f00009f3000), 0xfe24, 0x0) read(r0, &(0x7f0000000700)=""/211, 0xfffffffffffffc53) bind(r0, &(0x7f0000000140)=@can={0x1d}, 0x80) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 2018/06/05 09:47:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x5e]}, 0x10) 2018/06/05 09:47:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=0x0, &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000600)={r1, 0x9, 0x20}, &(0x7f0000000580)=0x297) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r2 = request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="5c6d696d655f74797065ba2600", 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) socket$vsock_dgram(0x28, 0x2, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, r3) 2018/06/05 09:47:29 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:29 executing program 2: clone(0x200, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)) open(&(0x7f0000363ff8)='./file0\x00', 0x401, 0x0) 2018/06/05 09:47:29 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=@ipv6_newroute={0x1c, 0x18, 0xb03, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x1c}, 0x1}, 0x0) 2018/06/05 09:47:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [], 0xaa}}]}, 0x2c}, 0x1}, 0x0) 2018/06/05 09:47:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000002b00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x2401]}, 0x10) 2018/06/05 09:47:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r0 = syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x4, 0x400202) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000180)=""/161) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 708.418320] BTRFS error (device loop1): superblock checksum mismatch [ 708.442542] IPv6: NLM_F_REPLACE set, but no existing node found! [ 708.462550] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:30 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x2) lseek(r0, 0x0, 0x4) 2018/06/05 09:47:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000400000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x10) 2018/06/05 09:47:30 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:30 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x4) accept$unix(r0, &(0x7f0000000200)=@abs, &(0x7f00000002c0)=0x6e) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000300)={0xae3b, 0x1}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000380)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 2018/06/05 09:47:30 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000240)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/06/05 09:47:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00005d4ff8), 0x2000000000000ff) 2018/06/05 09:47:30 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x4, 0x0, "4011dcd87fd5401e3dcf009162d5a2c2d8b3fc9761c8cbba38d4ac0fd52aa1466f4f4f7ef14ee80af065bec496933cf7c92030ef7c0d4cbdec7f51e48c3ad70669be38ebca91e8080c95e16e11352041"}, 0xd8) 2018/06/05 09:47:30 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x1, 0x2, 0x6, 0xba8, 0x8, 0x35, 0x0, 0x4, r2}, &(0x7f0000000200)=0x20) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000001780)) 2018/06/05 09:47:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf800]}, 0x10) 2018/06/05 09:47:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0002000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:30 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ip_vs_stats\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 2018/06/05 09:47:30 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='autofs\x00', 0x0, &(0x7f0000000200)) [ 709.470251] BTRFS error (device loop1): superblock checksum mismatch [ 709.544071] BTRFS error (device loop1): open_ctree failed [ 709.555460] autofs4:pid:18168:autofs4_fill_super: called with bogus options 2018/06/05 09:47:31 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x10) 2018/06/05 09:47:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x4000, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000240)=0x1, 0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xfffffffffffffe77) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x10080, 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0004000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 6: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x856, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') write$tun(r0, &(0x7f00000000c0)=ANY=[], 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)={0x820000}) 2018/06/05 09:47:31 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:31 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000300)='./control\x00', 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:31 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000300)='./control\x00', 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/06/05 09:47:31 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/06/05 09:47:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000200200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x1, 0xfc, 0x200, 0x8, 0x8}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000500)={r1, @in6={{0xa, 0x4e22, 0x100, @mcast1={0xff, 0x1, [], 0x1}, 0x9}}, [0x9, 0x2, 0x9, 0xfffffffffffffbff, 0x1, 0x9, 0x4, 0x80000001, 0x200, 0x4, 0x3, 0x100000000, 0x1, 0x8, 0x9]}, &(0x7f0000000300)=0x100) mount(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f0000000600)='pipefs\x00', 0x1c0000, &(0x7f0000000640)="948d4bbb3b4abc56d2ea78c203153245ed313ca9b84111b1cbfa018918b40a337708ce4e35a2f7f8486fc1989fcb3bce2c8379d59a5cc9c92b15ee43318b2123837f69aab70426ae69164ca53a86d8806e79a6a48d9e3b449ff42d569979fadd01448b32309994feb07638c5401fc2c90e39295d590f44a1afbbbc290fc045bcfd4cf7d1174a981db5a244dc9c6eed173b0d9caf637d36c73b9540d01d0b4cef6d2a189dab2457e19c3cf3c3ab3867d3a5be8467e60b0349ad3f5fc5ed223c206ead0be1819665c38c9a926e031ddfcdc5912d290f5c7ee390d570ee971734219f6670") ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000780)={0xa, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x10}, 0x10) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 709.796238] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:47:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x10) 2018/06/05 09:47:31 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}, 0x1}, 0x0) [ 709.850713] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:31 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000300)='./control\x00', 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') pread64(r0, &(0x7f00000000c0)=""/4, 0x4, 0x0) 2018/06/05 09:47:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000020200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 709.929754] FAT-fs (loop3): Unrecognized mount option "" or missing value [ 710.050335] FAT-fs (loop3): Unrecognized mount option "" or missing value 2018/06/05 09:47:31 executing program 2: socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x3, 0x0) 2018/06/05 09:47:31 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:31 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB]}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x10) 2018/06/05 09:47:31 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000300)='./control\x00', 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00') 2018/06/05 09:47:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x12, r2, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 2018/06/05 09:47:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000040200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:31 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001"], 0x30}, 0x1}, 0x0) [ 710.351815] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:47:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000002b00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:31 executing program 2: 2018/06/05 09:47:31 executing program 0: 2018/06/05 09:47:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x800, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x41, 0x0) write$cgroup_type(r0, &(0x7f0000000380)='threaded\x00', 0x9) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) pause() rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r1 = creat(&(0x7f0000000140)='./file0/*ile1\x00', 0x84) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'yam0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@gettclass={0x24, 0x2a, 0x114, 0x70bd26, 0x25dfdbfc, {0x0, r2, {0x2, 0x1d}, {0xf}, {0xfffb, 0x19}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4040090) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000400)={0x8, [0x8, 0x8001, 0x10000, 0x5, 0x1, 0x2, 0xff, 0x0]}) 2018/06/05 09:47:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x10) 2018/06/05 09:47:31 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:31 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000"], 0x48}, 0x1}, 0x0) [ 710.399557] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:32 executing program 2: 2018/06/05 09:47:32 executing program 0: 2018/06/05 09:47:32 executing program 7: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:32 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20"], 0x54}, 0x1}, 0x0) 2018/06/05 09:47:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000a00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xff9f0100]}, 0x10) [ 710.574390] BTRFS error (device loop1): superblock checksum mismatch [ 710.613788] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:32 executing program 0: 2018/06/05 09:47:32 executing program 2: 2018/06/05 09:47:32 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000"], 0x5a}, 0x1}, 0x0) 2018/06/05 09:47:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000300000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:32 executing program 7: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x7]}, 0x10) 2018/06/05 09:47:32 executing program 7: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:32 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000"], 0x5d}, 0x1}, 0x0) 2018/06/05 09:47:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl(0x1004, &(0x7f0000000140)="2b4825fc57dd48f6955be14f0d0921c9b7548c4e2fafbe6e66ea5d6fe7a3bb2f1ed2118070d70cbb4e9e66983612d0b8a564761115a296a9ae1196e185ea537c5057e15a91b738124b4a851deb") perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') 2018/06/05 09:47:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000003f00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:32 executing program 2: 2018/06/05 09:47:32 executing program 0: 2018/06/05 09:47:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:33 executing program 0: 2018/06/05 09:47:33 executing program 2: 2018/06/05 09:47:33 executing program 7: fchdir(0xffffffffffffffff) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:33 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000"], 0x5f}, 0x1}, 0x0) 2018/06/05 09:47:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000001700000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x10) 2018/06/05 09:47:33 executing program 0: 2018/06/05 09:47:33 executing program 2: 2018/06/05 09:47:33 executing program 6: 2018/06/05 09:47:33 executing program 6: 2018/06/05 09:47:33 executing program 2: 2018/06/05 09:47:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:33 executing program 7: fchdir(0xffffffffffffffff) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:33 executing program 0: 2018/06/05 09:47:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xff9f010000000000]}, 0x10) 2018/06/05 09:47:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x4, 0x80000001, 0x6, 0xffff, 0x0, 0x312, 0x81018, 0x6, 0x8, 0x6, 0x8001, 0x4, 0x100, 0x28, 0x5, 0x7ff, 0xfffffffe000000, 0x1, 0x1, 0xffffffff, 0x6, 0x1, 0x7ff, 0x7, 0xb, 0x1000, 0x7f, 0x5, 0x6, 0x1000, 0x5, 0x2, 0x81, 0x9, 0x10001, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x11400, 0xe275, 0x7, 0x7, 0x5, 0x6, 0x3}, r1, 0x2, r0, 0x3) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000001700000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:33 executing program 2: 2018/06/05 09:47:33 executing program 0: 2018/06/05 09:47:33 executing program 6: 2018/06/05 09:47:33 executing program 7: fchdir(0xffffffffffffffff) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000fdffffff00030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xe]}, 0x10) 2018/06/05 09:47:33 executing program 2: 2018/06/05 09:47:33 executing program 6: 2018/06/05 09:47:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='vfat\x00', 0x3) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000180)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:33 executing program 0: 2018/06/05 09:47:33 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x10) 2018/06/05 09:47:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000002b00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:33 executing program 2: 2018/06/05 09:47:33 executing program 0: 2018/06/05 09:47:33 executing program 6: 2018/06/05 09:47:33 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000400000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:33 executing program 2: 2018/06/05 09:47:33 executing program 0: 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf8ff0100]}, 0x10) 2018/06/05 09:47:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000400)=[&(0x7f0000000180)='{nodev#\x00', &(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='vmnet0$vmnet1&keyringsystem\x00', &(0x7f0000000240)='\\\x00', &(0x7f00000002c0)="7d3a656d30256c6f5b2ddc63216e6f64657676626f786e6574315e6d696d655f7479706500", &(0x7f0000000300)='vfat\x00', &(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='vfat\x00'], &(0x7f0000000600)=[&(0x7f0000000440)='vfat\x00', &(0x7f0000000480)='vfat\x00', &(0x7f0000000500)='ppp1eth0$security\x00', &(0x7f0000000540)="6367726f7570776c616e30bc2e7d2d2b00", &(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='vfat\x00']) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:34 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:34 executing program 2: 2018/06/05 09:47:34 executing program 0: 2018/06/05 09:47:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000a00000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:34 executing program 2: 2018/06/05 09:47:34 executing program 7: 2018/06/05 09:47:34 executing program 0: 2018/06/05 09:47:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000800000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x24010000]}, 0x10) 2018/06/05 09:47:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140), 0x4) r1 = open(&(0x7f00000001c0)='./file0/*ile1\x00', 0x4000, 0x84) getpeername$unix(r1, &(0x7f0000000200)=@abs, &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={"76657468305f04005e7465616d00", {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:34 executing program 7: 2018/06/05 09:47:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:34 executing program 0: 2018/06/05 09:47:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000300000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:34 executing program 2: 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9523, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/keycreate\x00') r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000180)=0x80, 0x4) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') rename(&(0x7f00000001c0)='./file0/*ile1\x00', &(0x7f0000000300)='./file1\x00') 2018/06/05 09:47:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x5]}, 0x10) 2018/06/05 09:47:34 executing program 0: 2018/06/05 09:47:34 executing program 2: 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:34 executing program 7: 2018/06/05 09:47:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000202000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:34 executing program 2: 2018/06/05 09:47:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x18]}, 0x10) 2018/06/05 09:47:34 executing program 7: 2018/06/05 09:47:34 executing program 0: 2018/06/05 09:47:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000027fffffff030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000100)=0x6e) 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:34 executing program 0: 2018/06/05 09:47:34 executing program 2: 2018/06/05 09:47:34 executing program 7: 2018/06/05 09:47:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000020030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf203000000000000]}, 0x10) 2018/06/05 09:47:34 executing program 0: 2018/06/05 09:47:34 executing program 6: 2018/06/05 09:47:35 executing program 2: 2018/06/05 09:47:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:35 executing program 7: 2018/06/05 09:47:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x101000, 0x10) pwritev(r0, &(0x7f0000000580)=[{&(0x7f0000000300)="e3358740ce6bb7c32f5b2089ed607d939afc5ab676db8747ce2f6a61019bc78948f71f21d2fd", 0x26}, {&(0x7f0000000380)="a585f000999569206c0f75d50c91db27471e861b1f37f23df3d501fc6f0423d8bfffb91f71910a2df65f32da7aaf7616a4b5edd059103704e9024e69da085aaa8db7b2450223680f0fb4d393f99d7b900e8fbd94bddb94011d36ff4a5c3fe10c40b4b59501c57899f43e005b54770a6fa3375f854c459e6f26e425b6c17e54464f3aed9fee05279b64ea71f6f55129949920371113cd1135b1d98fc8e0e671122798709751a3dfa52c0cfc10ba51d943a804c7075e736ca5b1c1bc17bf915b25cd85f58eb41530bbe89fa4fabea9d170d3f13911eadf6d65186bf47381684d", 0xdf}, {&(0x7f0000000500)="5720bc657b869c7f3686bd89e5b6b1fa7817d41d011f96227ac175f074997be3de0ad9bb70756eb9e6917a27baa56bb89e554b779f02a854a690462e297ced9ef7165f93b77e2b1a39bcd1786a50ada325bfff40a56b147ef248297ae1bc6978447ec0c26d61", 0x66}, {&(0x7f0000000480)="150145778b6421d8f8d0c4c46aa54d94e6353295bb80ecc3cf034718823f1d183ad257aef7b9fd1113ad77fa1f030e2256ea713a52e1abeef83222a5e33c", 0x3e}], 0x4, 0x0) r1 = memfd_create(&(0x7f0000000180)='vfat\x00', 0x2) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f00000001c0)) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f00000005c0), &(0x7f0000000240), 0x5, &(0x7f0000ffd000/0x3000)=nil, 0x0) r4 = dup2(r3, r2) openat(r4, &(0x7f0000000140)='./file1\x00', 0x200000, 0x40) syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0xb413, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000204000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:35 executing program 6: 2018/06/05 09:47:35 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=@ipv6_newaddr={0x34, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_FLAGS={0x8, 0x8, 0x284}, @IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [], 0xaa}}]}, 0x34}, 0x1}, 0x0) 2018/06/05 09:47:35 executing program 7: 2018/06/05 09:47:35 executing program 2: 2018/06/05 09:47:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x2400]}, 0x10) 2018/06/05 09:47:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/*ile1\x00', 0x40000001a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4f8, 0x0, 0x1a8, 0x290, 0x368, 0x368, 0x460, 0x460, 0x460, 0x460, 0x460, 0x6, &(0x7f0000000200), {[{{@ip={@multicast1=0xe0000001, @loopback=0x7f000001, 0xffffffff, 0xffffffff, 'erspan0\x00', 'veth1_to_team\x00', {}, {0xff}, 0x4, 0x1, 0x2}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}, {{@ip={@multicast1=0xe0000001, @broadcast=0xffffffff, 0x0, 0x0, 'eql\x00', 'bridge_slave_0\x00', {}, {0xff}, 0x7, 0x1, 0x10}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x21, 0x101}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x21, 0x8001}}}, {{@ip={@empty, @loopback=0x7f000001, 0x0, 0xff, 'ip_vti0\x00', 'bpq0\x00', {}, {0xff}, 0x1d, 0x1, 0x3}, 0x0, 0x98, 0xd8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xffffffff, 0x800, @ipv6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e24}}}, {{@ip={@multicast2=0xe0000002, @rand_addr=0x10001, 0x0, 0x0, 'vlan0\x00', 'eql\x00', {0xff}, {0xff}, 0x2f, 0x1}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0x84b, 0xc, [0x3b, 0x1c, 0xb, 0x40, 0x22, 0x13, 0x27, 0x33, 0x1b, 0x1c, 0x27, 0x3f, 0x0, 0x14, 0x2b, 0x13], 0x2, 0x8, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x558) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xffa7) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:35 executing program 6: 2018/06/05 09:47:35 executing program 2: 2018/06/05 09:47:35 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) sendmsg$netlink(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x161}, 0x0) 2018/06/05 09:47:35 executing program 0: add_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f00000001c0)='/dev/infiniband/rdma_\b\x00\x00', 0x0) 2018/06/05 09:47:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff00000002fbffffff030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x3f2]}, 0x10) 2018/06/05 09:47:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = memfd_create(&(0x7f0000000180)="23656d31232b00c18b602dc42b7636be27dc8117e6564333ab229bbb21ab6a5755d4668aa6f0618c1de33faadd6bd18b94065793603f3e64dfc0f59b6233cf6261ad08c2e86271", 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) fstat(r1, &(0x7f0000000280)) 2018/06/05 09:47:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:35 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x10, &(0x7f00000000c0), 0x4) 2018/06/05 09:47:35 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) 2018/06/05 09:47:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200400300030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0xc2040, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000180)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) 2018/06/05 09:47:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf000000000000000]}, 0x10) 2018/06/05 09:47:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {0x3}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x20}, 0x1}, 0x0) [ 714.111843] netlink: 'syz-executor0': attribute type 2 has an invalid length. 2018/06/05 09:47:35 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:35 executing program 7: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200034000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:35 executing program 6: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 714.158127] netlink: 'syz-executor0': attribute type 2 has an invalid length. 2018/06/05 09:47:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:35 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003e3dca456e5425ebba1b663bbd20953b374fd462e9320e86bbc7b6569fc9cb73a12fab9fa6932ab5ede694cd8b096ad0d5b3ba3c"], 0x68) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000080)="0f", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) mkdir(&(0x7f0000c92000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) writev(r2, &(0x7f00002c8000)=[{&(0x7f00007fbf5f)="b7", 0x1}], 0x1) r4 = dup(r3) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x890e, &(0x7f00000000c0)="008d677ea6981d5aed6aed") ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r4, 0x40bc5311, &(0x7f00000001c0)={0x7810, 0x2, 'client1\x00', 0xffffffff80000004, "d6cf80371ad4f819", "d2264915b64b7dd9463400665a43bd9a13528a94616a5c79f5a2bf19e1ee1f2e", 0x8, 0x1}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x2011, r4, 0x0) sendto$inet(r1, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x73, &(0x7f0000018000)={0x0, @in6={{0xa}}}, &(0x7f0000000000)=0x8c) 2018/06/05 09:47:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 714.285533] BTRFS error (device loop2): superblock checksum mismatch 2018/06/05 09:47:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xec03000000000000]}, 0x10) [ 714.337561] BTRFS error (device loop2): open_ctree failed [ 714.385818] BTRFS error (device loop2): superblock checksum mismatch [ 714.450182] BTRFS error (device loop2): open_ctree failed [ 714.583098] BTRFS error (device loop6): superblock checksum mismatch [ 714.607585] BTRFS error (device loop6): open_ctree failed 2018/06/05 09:47:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000002030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:36 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000001c0)=0x3, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x400000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x20000, 0x0) r2 = accept$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f0000000500)=0x6e) getpeername$unix(r2, &(0x7f00000003c0), &(0x7f00000002c0)=0xfffffffffffffef6) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') accept$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e) 2018/06/05 09:47:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf903000000000000]}, 0x10) 2018/06/05 09:47:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:36 executing program 7: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:36 executing program 0 (fault-call:2 fault-nth:0): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:36 executing program 6: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 715.351423] BTRFS error (device loop2): superblock checksum mismatch [ 715.407608] FAULT_INJECTION: forcing a failure. [ 715.407608] name failslab, interval 1, probability 0, space 0, times 0 [ 715.418941] CPU: 0 PID: 18760 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 715.426055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.435428] Call Trace: [ 715.437274] BTRFS error (device loop2): open_ctree failed [ 715.438166] dump_stack+0x1b9/0x294 [ 715.438188] ? dump_stack_print_info.cold.2+0x52/0x52 [ 715.438206] ? lock_acquire+0x1dc/0x520 [ 715.438223] ? __fdget_pos+0x1a9/0x1e0 [ 715.438245] should_fail.cold.4+0xa/0x1a [ 715.438261] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 715.438283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.475209] ? _parse_integer+0x13b/0x190 [ 715.479369] ? graph_lock+0x170/0x170 [ 715.483165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.488703] ? _kstrtoull+0x180/0x230 [ 715.492510] ? find_held_lock+0x36/0x1c0 [ 715.496593] ? check_same_owner+0x320/0x320 [ 715.500934] ? rcu_note_context_switch+0x710/0x710 [ 715.505855] ? find_held_lock+0x36/0x1c0 [ 715.509913] __should_failslab+0x124/0x180 [ 715.514144] should_failslab+0x9/0x14 [ 715.517936] kmem_cache_alloc+0x2af/0x760 [ 715.522101] ? lock_downgrade+0x8e0/0x8e0 [ 715.526250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.531785] getname_flags+0xd0/0x5a0 [ 715.535581] do_renameat2+0x31c/0x1150 [ 715.539465] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 715.544389] ? wait_for_completion+0x870/0x870 [ 715.548964] ? user_path_create+0x40/0x40 [ 715.553112] ? __lock_is_held+0xb5/0x140 [ 715.557179] ? __sb_end_write+0xac/0xe0 [ 715.561146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.566672] ? fput+0x130/0x1a0 [ 715.569942] ? ksys_write+0x1a6/0x250 [ 715.573734] ? __ia32_sys_read+0xb0/0xb0 [ 715.577876] ? do_syscall_64+0x92/0x800 [ 715.581844] __x64_sys_rename+0x5e/0x80 [ 715.585822] do_syscall_64+0x1b1/0x800 [ 715.589697] ? finish_task_switch+0x1ca/0x840 [ 715.594193] ? syscall_return_slowpath+0x5c0/0x5c0 [ 715.599122] ? syscall_return_slowpath+0x30f/0x5c0 [ 715.604051] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 715.609433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.614273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.619449] RIP: 0033:0x455a09 [ 715.622623] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.642756] RSP: 002b:00007f11fad37c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 715.650459] RAX: ffffffffffffffda RBX: 00007f11fad386d4 RCX: 0000000000455a09 2018/06/05 09:47:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200200000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 715.657730] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000000 [ 715.664986] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 715.672245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 715.679519] R13: 000000000000057a R14: 00000000006fd410 R15: 0000000000000000 2018/06/05 09:47:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x24000000]}, 0x10) [ 715.758547] BTRFS error (device loop2): superblock checksum mismatch [ 715.786461] BTRFS error (device loop2): open_ctree failed 2018/06/05 09:47:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000001030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:37 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 715.820497] BTRFS error (device loop2): superblock checksum mismatch [ 715.872682] BTRFS error (device loop2): open_ctree failed 2018/06/05 09:47:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x300]}, 0x10) 2018/06/05 09:47:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000004030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) utime(&(0x7f0000000140)='./file0/file0/file0\x00', &(0x7f0000000180)={0x3, 0x100}) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 715.958610] BTRFS error (device loop2): superblock checksum mismatch [ 715.989313] BTRFS error (device loop2): open_ctree failed 2018/06/05 09:47:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000001f80)='./file0/*ile1\x00', 0x80) socketpair$inet6(0xa, 0x1, 0x101, &(0x7f0000004600)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005e00)=[{{&(0x7f0000000180)=@l2={0x1f, 0x6, {0x7fff, 0x1, 0x4, 0x3a2e, 0x4, 0x1ff}, 0x100000001, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)="b35f47ac37ada07bbec9e35249d087c52db096465909fa19a4737b87453b9bd646f5809e2a44a1f7255374ab413789d72766", 0x32}, {&(0x7f0000000500)="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", 0x1000}], 0x2, 0x0, 0x0, 0x4000800}, 0x1}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000002c0)="9506354369f5b637c08b8eb55cf8682017c78e8833c32720f9b44b3d94e7b43eede937beaa075c09ed17a5d72c4196fd71763d17bbc3cd4c31bd64b7afbabf9806dbbb561461a6543e59f5859bc570194e3600cb1edaf5ffeae669b115017f22cc52af9ca73a976aa3fcbed5bf120f4d0726a1e6bb", 0x75}, {&(0x7f0000000380)="ddbf61d01417e1aca762aac6cce8d7529dcb8cbb0f6b3fee47dbfdc2e8c6f46cd443937b9726f8a7bd3786d6339a73d7d6e217989b8ddbdea752f1885abd39f64ba0d60edfbe5420f7352ca56d2472494854c7c11c3bc128666e8615492520ebb1a81d08b623b4aaaf43ae0b8ac4359ebd8b9153ab98b4b0aae8572739ab5ea0fe67da5a86eb974b74353f0ddee9fe5af06c0ea246c085525dea4dda92c562149fad7ea8cfd21924e9a9d823d43d869f8cf823fd7c33014201039a9ea0eb0e604f4ee7dd4d50379a", 0xc8}, {&(0x7f0000000480)="c71c450584401ba53dc9e3ade83d82a592f59165f5b6092de9af7afc26562a575690584f4107f7e0dec26d", 0x2b}, {&(0x7f0000001500)="69d36408c9e6d33199bf6f843e685f59413439d78bf571564b571844e4dcb3364efa626e6e80f0583edad3403c31319e5cb4296c1112d65ceb6eb793581a4690a010d5085adb0052a81b9a80064021728eca326a268f799d1ac1807d9509b806e3daf2b0fb89c7e8f75d8462498de965ade7dc09138703eb11f34bf16df724d064", 0x81}, {&(0x7f00000015c0)="cbd971e478a8f9956e431baeebfce34a7aede37f8906a4ced5917860de47935da0ebf25bb6a4502cbe6ad239e3d7a9f69a605a73a1b1614709", 0x39}], 0x5, &(0x7f0000001680)=[{0xf8, 0x109, 0x5, "f379c0ef8e667306118597eac8e51f9f3df535ea83822d508a5d50ff53369d0480e9d640ef835140b25dd289dbd65f871c2c7795bb9f0b7365466ef2e6dec41b766101ac2b1b5655d2c057bd9bc673ed2f3b86d7155c6ba9f656b2aa76ef47b93fa37d147dfc949773ce55d51dc483e296ac7d34c8c6d7f6a2b7aaeb2a372feccc5cd55520456d1cc5b36d6384a4011598bc4c185956c55230bf95f0d450e1e6427bd9235191adeb64ae4684b97ce3601a86c3ea4072b5ccd7ad88e49ff2d97c70bf5486c68994f0cb8d9c0110fe73e5bb4e8a102e0ad1f68d934fd5d2d4aa1d76"}, {0xe8, 0x84, 0x3, "7dc0020d1065a5fef917eddaa6946149462f0ce3857b5e535a7e4fc0bed5eda35e8eaa7bbb1580b00551423aff27b7bb6eef1101917d3f3c5c1044096dc49bff938f0c311f9c5f7156e4e23643d693104720646d9bc19cbbd9f53d8a7125974eef4615ba1b4bbb035a25aaa74f5797d4c3f25b3bb1824e7f896db462ada244648279c7bbf4cbf95a48bade60a97cd4f674e7cbaf2a7898a0d966e343c2fe4dcc0f017b828671f4c43cb4178e64ef869917752d6b7832ae582cd156c1b51e9465f96d7bcac1383299941d072e45e4395e10b4f33a6c"}, {0xa0, 0x116, 0x3ff, "d7f5f6b1c83667de76e8dee1d02490dc63a55bebffc68ed6e80b166f2b438557c6b9fb614e483737562310e66e55b05bc82ebb8bd5f85c02835b617bc40c414826504394e7708c529e4cec47e48f3a67dd29681c5f33bd794674955ee8ea239a05e9dcf5811b83e40a32a1bc6a4c0c2f5c347afe8dd540af9d144fb56f26ae3c06e280bee03d72fd02e3905f"}, {0x108, 0x0, 0x0, "e98b1dae60dd2ebe8cd87adbef7784690cefe2b238009563d5b064c075b5cf9a383d2fa05bd9a77f50bd2a3646a410359505efb72744bbbff6df409efdd2f57068cf6de337afdd56b23ba159a86d352f422dc26bab75460f705cc28301dcafad121a9bc5b8b38e342d79761c03e81c2822cafe68460bd377012c269e94933d33972e4cfe96d8fe3fe84a5d019883daef4261dcc25b031a489a09dd4890c4105aa7b4bdd2d204f6df82aa9fecef7f1fecc4cd16479bbaca2dc6421c105730e1d865d58038b01dd768ed27db011b81478a757e6655767e7370d8bd8712f7f12a5ee7e8f089eb2289ef5f418b6332d43ac78bef"}, {0x50, 0x119, 0x7, "90cc7c52a34f34bb089d05975cf80a1dbfcace35238a44651c4c1ed08d69f81b2bd494ae165da64e3794247007cf011fe60bb47d6e8105346b20c8e3bd59eb"}, {0x48, 0x0, 0x1ff, "01d5b1fb8b59002d1a1b101fc57b0b72cfb2eeed23a727f7a2e4a5da64b010f7c0d72b518e7d5b24698c72c3179aaf2776ffdd"}], 0x420, 0x801}, 0x6c19f0e2}, {{&(0x7f0000001ac0)=@in6={0xa, 0x4e23, 0xfffffffffffffff7, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001b40)="ab460417fa56c0fc88c464cb157a29592e62d5faa20c3114abd2bc17db8be4d8231336716a6f2791bf23770b537735a7c9b746a6a5c98c807cc4d826a28ff26a53a0e4aaaadacd442c6b3a0bcf492f474d6fce56463947ebb7abeb1783c03558952806b3038b199745afa7ac76c5912e18699988df6f23e5c76db3bc2cc797063f63940c7568002135fac50f847cff3606356a81a9b37d94c89f6f95a541cf841f0432dea8b371720348a29e965ed004", 0xb0}, {&(0x7f0000001c00)="d2eedc54c663143fcb4d0a50d5f316a638bf7fa2aac9ffa82cc9dd9a2b900492c65812654574cc703becc7434cf65ca7bb131ff1422f77342a14ea93c5d95887fb1db44172d211b43323b06988c939c1b809caea6286a2af0eac6afde420f2d90870c3709dd06ce586e7ccf129d76b48fe9ab2559b66422449d91bc3a70dfbed129eb775439e93ec4916a0e7b4683ff804453c7dc7cc", 0x96}, {&(0x7f0000001cc0)="21d9be256ae1adb57da606adf516de3548829b945a89ef022da0284a2f266d624ad70702e0211c633e4e4fbd56465d88ccb703a7a66a93eee9d238fc468cd3ee49b5d7ae0f217bbdcae982f3db70faf281d80675a65e1eee26f46dcb3c6df40a2ad3c77a7c960f0ffa7caf18a8dd85c84edbde272b4d5604e607aae5f2ccfb7138d56bca1ba32939307d249befc8998d1125e4096fc03e1aef6da64afa6ae4d4403d0cae4f0173ca28c1478b120a12358d16e7ec12cb4d79fe106c2a7574a8c2afbe7db197a3", 0xc6}, {&(0x7f0000001dc0)="e07d84d55d3239919d315491f5870597b36d20d3675da89836156428169363dd0c1634627c11661fc8378ebe862919617a0f55cb911792189fe0a9f9b7a6b3658b3fc96c6d3a39bc88b1", 0x4a}, {&(0x7f0000001e40)="d61627b1cc77fdc7aa7dda43015efdc4ed88ecc4fccfad5a5fdbf92a7a2663ebdb033553d5a8be764f166ad593202f394e7022da958f9bc57dc350ab15eb44c91963c2606775c44f3808db34fe512235bcf4cded446c2db4b7f419df21ae93fdd311be16c2fd07c9afee8d2c75c5a1705544b7f08dc577cdcbb939af2d659d02d05a07bd45a6e624bd24c25f9c95a1e44075f5a99c982023dec2095369e67edb326f05a5a9d075b8fd1552b4d42474", 0xaf}], 0x5, 0x0, 0x0, 0x4804}, 0x6}, {{&(0x7f0000001fc0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24}, 0x3, 0x2, 0x1, 0x1}}, 0x80, &(0x7f0000003340)=[{&(0x7f0000002040)="b1147e2e50c79da2ccc53c504a31c3f0676c6e552a2bf30fea4768f2af6ed0c8ef2f228fe89a971662612acd50279b58d1ea5faf2448c0a1ff420395ea0bf8d7f147f28d1e0115e302b3eb3407e4a28e68261fd10d6292e58a7285d411afaac6183f066e22b965163e24b79ae57cbfabf6fa8d6db75ddb245764b729b1731ef075fd6412bb5e0f0d765ae4796c47dbe932a1c3c5c2bd5a9ea883640413ad234b18d1a7c79ac294b8174437a20b47425e641b9d09645d91d2cc34263160fb72427e002258e91e9683dea190b24c9f064778482711c056fe8afbec497b842af7", 0xdf}, {&(0x7f0000002140)="7a9a2dfb0ff739e9eb8b3f833b4060140939960fcdd02c080f2191aca8b3923d63e039b61a81a42ad3a61b9fdd1fe558b025ea59c53b46657c84b901e1d4a83a48eaf32b875d2da18779bd83a4f5d560a29d43634ff83fae99768ff667bafe36dd009411a15926c1c87a9254703512386b574758af19a7fca194942dbe8a55f3f466e93e7a9dcca212230e84e7c5d278e4b70435cd3740593f83b55ed205ab70f3ca3ac71638d44fd18a1b158d7753434ba622880b7479e20a7a14b3bbb8fdc4c7305e8b3f81ab4abe6fa9cd2c10e6ab80476b17d2ca70ec159559d8c73b0f4ba988cbbe1b52", 0xe6}, {&(0x7f0000002240)="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", 0x1000}, {&(0x7f0000003240)="924f7e4896f6396fe35b6790b1680ae4e1864b07a8879151c3a1b0715375b741cf7379cc4ac51710173010901c8b5a2b13ac51540a342af3863597b1276ad9e5f544f2e7f8bf2b9e26166d002e2c5a4cbe0354c500fe0585a56fc8b43217fdc495f7b604faeab2e9bcd30cc7522be2d22636385d979eae8c5709fcfc7d5e5b14990701fce19198c3af6733e5e5decfc0ed73396e09575b050fe505496ac607c5389d2278a4bc6bf0e1db90c0f63a8b6e1aedbd1c06c9d804829962bd8915477bb9c4c20fe91409758a13f937a1689aba8e8909349916a07b3fe85aa59ace1abb46e8ca0eea2343390d088a14bb9dea1c0dfec5", 0xf3}], 0x4, &(0x7f0000003380)=[{0xc0, 0xb1ea19d332c3ed2c, 0x3, "b4380adcbb00e8b7245ba299f97d6ec1f7a569fa1815fd87666c9d67858629dce2bc3690633d5820e5f8c72c562ae45a4b687a9a3084ee16143581b560c8a91ec8b3558d39b29111ce6c9ad05fdbe110b7817c40f9df4dc986eb75b77e2cb99ecf60665a12f9eab91fceef86f3a88490e62866476ce678eff1070ad6b3171366befc8d9fd7b24edfb816e6d274e60d9fd0da6e035d76e85f2fe47f9fa59bf69dc74a5e0a663a0a7936b53c49"}, {0xe8, 0x10f, 0x7ff, "94c19b775d5bb1450859a24a7af8c4227a475d47411519f050b92578b0e3462c87ef63513678deee4665ffa4b03e0f940fc31d2b288322ba47f06d501bddb120ee037291e5d06d05e39c0ddf4756420d1f1f0461e56e3e272a9860274c15ad86a9359645e07c8e3157a374ae0288cc711d5640120f73b01cd4c6d223b68d9196e1546db8b25827df3549cf6bfb380d26980b309961ad437d528d5cfd2b66f9d55d8aadc2be8bd8ce746036c91237334e3024ee7b271f88119a241b680ee2a44bae5bd04043fbabea53045ff4b00c83f78f1f029727620d42"}, {0x1010, 0x10a, 0x6, "1450c80e3d4ecc02e3c3c167c289140f769ce5adcc00e8b5a01c0f5f086cc0afe9ff696e60d238d85e98bbeb84edd69468cd62c9893e836c3e9200e118a65179834459c59f702d8958ba2259417c09dcef23493615479fdbb99f6dad079a14a3f4c86695ee8be8f2e512e6f4d749a102c99432871f5bdc1fd05a2ae6102f4790b882c1ebfbb6b9e1ee5b7010611f2311bd2fcee7491648bfe0ada948192847b005b1e5adde8d6c62bc90e00edad1caa4eadf8274504343ed340e3067c69e97fa64a005d4ac49f0318b9738b82b4fb0f9b82c47bc3cfa99c619c930e22834bab59dc25501ad4965f4565baccb4b3ac431a622fc966de00635bc7efa2535fa9a0bc5a0b8f8f00c2c0bd9699d894a65137441af2127e91e5f84835f03bb4610529afaeb5363da869eb71507772259f325e07dd8855d16e4631e00c4df27d1fddcc79c73a416e09ca54168cc32d79367860a906a17ceabac10fe63c7bd80d02adb39c16ec2efd10be4662518a9d4e811134b5930113b0931f2caa9d6ad21e1b0dd639d41f28e39656335c11bd422aa32a98fee00c3d704eb067307670c53578ea712740f6546c6375daebf845ee757ad370bcd30da68d098d45cd00cabbec0fabfce167bc452e15527dffa145587aad4beb6fec5857413d4738992b2e44e66b2f9e690fe0dc34a6d513d3bc8cbb8ae995110f5b0d1c8b1ca1d2bc77a113a5ce21c199f5fd555bd4d164f04287a33335c93a53b5f02653c6d5eb968d79404831fc39d21046eac00b892bfbb4d723aee95407788761373eceb20c3d37e155ac6a5a280b0bd1b81080038677ef575ebabc88dfcca349a062323c3b851b96406d8393c9a5a5878541c78aff3c1252e8009e43951d5a61c8fefb9c085833578b241a9c0fc4ac29e710d410a506365c1320fb7454630ff0a7bccbcd2a1c8c1fdedc9fcac2cd347c5634732745f2d2ac14ed0616a9736bd457a8d6513164d2c3266816c512cd334c6c8f4b88aba6fb701830761fd89624803e4aebd74f83925fa66b6f2657638c0b0802bcdb562e502c3456e89c3b7165ee656da932c32ebe510e4e1f64957c2da5daf561e2cdabba889ec0b278706f822d32599003a4a5d359041d1ca56f7454133aeae2c9fea51a18fc05433197cc968c0aaa69a7fac88eb309a6fa84bde39de77c1bc51e0771e7f4961948ad749a3ad5489610e36f5e6791aaae646d3529d822c8b124f2f9d21ef42af6cebae7e4a7b7f62737bfc3353c5e174915c7f343d290af6158d71d68cfa58d1a5678a3ed5cf1fb456715f0b15438d922fec7fe1b9d515eb1871fe3a6efa9991544f063c96eb1671105730d826ebaa9178ab9a2b06f8ad178672cc382ef6011b7795b7aa5ce570cffae68233901cd8e333e5c49aca55d73d4912f336130e48a5995f815377fc97b46b3240bccaf1561bd4159c38c67ba4ac8e3741ebb749cc6892190117879c432d472b7afde7666749e7cbf59d82bc75b47ac0e0355fb3bc3a158f8154bdcbb6468222b5319d35eff6724d1aa97ad72c0b17f8d7ba7554a4de34c1b9408f0ba7298bda7ca8f230baa644b1a377a8780311d6785d3a1d60ac4d0679eb0fb19fe768f871099774b6f3c5cf2f89cf82b8287f1a063bb780c600d00ad1d307ab509cf7e236514554a2541e7747e83bfcf05128b58ed8de008a2f385bbce8491554db390edb2a50f3d20171cb91ea61940f3f32e9bf4bf2fe546cb476b2fc6fd222889cd147f74f6ea6a843c53892026cfb577d100536e598514ee89a782cf59ad5d0a3f91bb4bcf811fb11a1458c559b3d5fdfe7e0916ee68b40267c3eacd2f60cf63212a14d8e18e9af4ed4e345d44c4d6537e6d2e5e9b4e8e96fabe45458e686a02372efb81a5a5a19722c7b06b9146d4be11338859a34607b5d8036043007612e069e442bc39f863986d47e187b1bedbbfd47b7b438507c1cc5cecbb79c997b9e9c1210c3bb70aea17e185c713151e44e9694985b5a38047647f9e8ab53384363cf1999b3c4a3b0616f7955b00ce623115848c3ae70c59e03e9a94f918be95079b237eb83bf571b35157e2e0e85cb41e0ee893d794b4036816d5d790f34dd1371b2aee6f29fb7dfc9fd10f5e63a99dd199d2a421d8449c6784eaa4f7767d18cb0aeef70104b2925e37dd41a59e5cbb0c0e815f85622b791a35061a8812340b1ae6f3717b9b759911db8d2166ab3cba3237da5deda7c851a0527e48c8da1babc1d601d680575068ccb1d54707f1fadbdc3ea356625cc28a3ffb2d2aecf7eb6ac22b71453f54f8c8a7c4f731c6ecbacac0dbd3edf30e20c6ceecb9fd595a0185f1a0328c2b49b9eb7c50491c46939580f30185cf346226e2ce8b70d99b12efc082ad1b84ac9f89028fae9951491262a654e7ac8f1542818488f963032963f188d4c9c33c56ba0a07f45489a4dc63904ec62502b9526a11f03693b8f6a3ebf25b3aad85f92d5ed0234fc519ce64992ec05938cb9e99e7366b7afd3cfe3fd918a35d4fbd37b8872269ee5f096928b735722b4653cc84e10d6585e3e3abd636f3aa6eacfc43f484af4b8026fe14b0a163280e4982e8309b70cc645936bce863cd5533ff4c49d2d49232e5dca60768efa9c123a2d65544e9ec65575669580651af47e61bc05e9221dde23b5a1f85e036abb158b0997a5c1dcdbccb1f88e20ee65d7a3df1f5e8c6e49ccbcbbc3afe4aae2ee7d9700d50dab6884882770e8e51c4fbff933a307140da17d879f15321453c59c47ea3d093de4fd590b867a1f9a449987586cecbff3b4f4ae52ce641448aeb22cd48b9454e7fdbc1cbd45131351e960b5a2887561ee50964fc1818198019c90a374493f71bbed0df2787cf639483982d54fd5ac256cad4224c827282980f0e3b49c8e1dbf81ec4d112a878e3f271e74c3d1d5ec50c087a62c0b6edd6d48422fb11a95730d3e8b8980762560e9f180e72aa433937f2123c197d5c4568851091f1aeef16a37e221770f9c7d081ad7dd60864cc0299d75a077c4aad34980ef6630cab46776b55b0bd9ae8174164a7981441c6985c221505c1b6df885830ff8d3ba08fa2084fe3909f463d2e49f503c86659e0bddb569db83b2f550a67ce16705ca0d83e368092de035447c3a71c302920972befffe91ff8d7188d55bf9978e65f0469516aaccefd6c1609d1e6e3aa9e9c61147d7b45609839c74e2c1d6d77c8b426fe6bbe468a711bec238798f1a492f9899ce4502893ab37d36ed62110acb6f64e723ca9d9d7a94c68bb45e585bc0bf09710138c1e22a228ccc567222db05612360252101817662a6a99547fd48ac0768e25bf3f406e22b8dbd7dc7c24732836cedbd30ec7c1d95897947a9933985e39355eeeac5e5bf554716f48c139aa54b35833bb2fdf1ec8677cf22e90d06e35fa1d7b5832cb5fea50091b1f155625490b3c50102b4462a0868e1b38cf0529535a80e48efe5212c822c22c19c4415df362277d9384209b87949076ab63cfc4781f9486e40e8522b4abe59f91e32cfc76d4d1efdc896a353db683d39cee91a86f33c9326b574373a39a37d1c61cd52e58cd744a848adc2027207259b53aabcf4cc4b3ba289c2f975488e46624daca46d0fcbe0830b4f406e380d89bc6881ab4e65f6bd54108a90526e4319591872a10a72ecddfd958da9e0e63f4a116a8574c56617c6e89a83efd10db2682b16e0ffe43dabdc2c9b64b0f4f01e063973010a81b559bcc26a56582a60b951a06fd2142a69982fe30ca947d10c67719d83cb3bb9190e06592702bd7892b2823d005755491310bb6c28916a40872677b712da47e23bba58f89481d569ec9f3ea50914425bb54f97ffb227c843a392c8a0c9b71cf33fbd6f3802d6b8aa303ef3dab4362b63774caeb0e4f5445e04f940cd1068ac500c89b7a3c0e9e7006e4961c3bddde2ed40fc37b4abb3ae402f9c7561bbb10ad84a2ae2215eb28845b46757cb173412c1bfd9ce1f0b93f0d9ab8d0a80d311ae3676818adf819d4ecddfc0e3e4b5ff10103fac8cd3fedc7a6613cfe138c8521c8ad08434b4b1ec962d7c5a220ce84202ff07d5fd81cd032a008fd0eae1bb30292e7dd679222f249f6371260b684a7dcd7ae59d7c875f08d0edf1eb6eb0f8cb93d433db9968a5efd46a5ed9bee3c05ed19ddc7a34285aa8791f1f3c48ca3b48045db2f56caf612f7396cd44a33f79590cca4f297888e4119f6bf265e6e739439a26ef0b3e82c498e61d8ab98655b4645c6728c3f82235f4c23e210060dde7ba1a8b054f0132dc99f3ea5f96ab312373bc3c04d18bb9570614ef6950fcedb3107318964f452699cddf306c515e12a6d19141fbc2031b64686a028fbcd20e07147b94ba08470e085ebe3a98058729b2a2d81b84957f537625f029361dfab1cecf85044dd3d241483517b30a91eb42051a38a861142d7c6274ee0934a2f575b6a437ce4b43788744c679738ed632388d5f9e39fa5d5a85716f93d771fae273eaf6cc3270a2f18d11f05a3e300a45862299d505c011d82ff64fcfbaa9a9ea2869342437b4a263cfab4a7987d287685eaa3b2c41088e220714112363b4d47d164084dac2230cebe2df3d3cff25440556ba4d6e04be1fef4b2b0c6af385fc570920ef1d76762f1d2025f26d55f1a43e60343d032d9bc0bc2ac346d97b10d64dbd0b6b56f8f75cc9203b2d70018ea8f60602f66b29682e4ef74e621083c235f227c9c2c5d0fe6bfa06f11c129b40829786453377f3e069b82b044dbcc334d9d397915ef3e5a53c39403d5d265e7398e0b78fb1bdc60184887ef5f67646507ff2a7f410f382d344368b2feab9a3718c6d0daac865f7a71a63841a34a02401995605493b9615bb853ddc22bf3d739754df9873fa070bdffd76ef6a8b576d0e11420dd93e24a689f5c58a1c8d7c4c15ccb6d26b6b342b0db12430d2d64a0957bc68238fd46aa91881b1512cb375958abf3cc8930dfebf5fa0944beaaf2a2deb93f4fe214d21a2df5887943a0076c9cc43e01868f28dfaf1aa5777c89e128c91396e7aa9389ab52307701e5a36dca7bfb415c6161835a52170e5ae32da986366748f2f4a9d1c5b34a7b0139035809b3d498aa68c252aed94f78d2ffab45b349ba1607e4160be7d43e29b94c5f8371b59df0af70b4e9bf7b630f69147524c90af708694c802c9531546ab224bd527e298ae9198798551ef45d75f9af39aed4860439b7421255d20ffef296be2d86f392a88c309a822561baa3ad8b30112e974919106ad68f8ff54dfb23ebe25813f61fef954482811e785bbb77227fe0b96b1ee0b416c77a33a806f853968f74b4ad9e08af4f6832d0d6407720622c1bf8ae68f6c3326be5f406f62502ea53b45ee5b3830191798f753e2b3b8887ee30abb2073b76c4a4c8c29419d547a03c14226e414f99819b5d579a244460f842f7d9a907b3dca554bf0da59b20d52c4eb6edabda76ccb4a7db8a2db7a23f2dc1ffb2805989553ab96aa9ca01cb117b22267094dd8d90294bb458d593dff0d5fda9f7348f2a69c1662614693537f5131bfb753db38a577898a342b3281643ef9845b59e9188ad65a5b3e56505b3fdd51b706352dcbf7cae0a899193d89b71b2db89f9ca312fd2054689b07fb57e47a161128715d0d7149955e26bf00d8673034b59bc88fe0f1a048581b94bacaf242a112b8af073e5c18ec35dc9ae19ad20a539c97704b73378f3e311a43c8ea444e28e2ff33213b6f05a621c56b1f6cd940983192b3fc6d7a3df356bc9eddd77942a40b6057d0ec298ad7b681b837f3c1"}, {0x90, 0x114, 0x707ba2be, "9223f5983b37a5132450b8065e6349b03afa46593d74169bc5509c6aed989f5a813302b82ddc96c4f54879adbb9e23a48d4b7429e05135f49a874753abcc56fbb161ae1d6796b74733fc076db22f98066803392e830b581ab950c8d4c126a78f60d93278cf2e04f79633a3306280852bea47e96fd805133ad0cf2b760c4066"}], 0x1248}, 0x80000001}, {{&(0x7f0000004640)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @multicast1=0xe0000001}, 0x1, 0x1, 0x0, 0x2}}, 0x80, &(0x7f0000004740)=[{&(0x7f00000046c0)="93fd99d1c33dec2c0cd19bd4364038618835", 0x12}, {&(0x7f0000004700)="c3f8", 0x2}], 0x2, &(0x7f0000004780)=[{0x30, 0x109, 0x3, "1a4bd1ab97651970f4b2f6c1c365043d425a9449a141b0a21145dc2e95027af0"}, {0x18, 0x10a, 0xbb, "9673a055fa8486"}, {0xf0, 0x0, 0x35, "c4bea4b9138a28ec94836371d3f56ab403e5eb810d3abc809c3797b637adb4c3fa48c76442e2c578eb23781a08941f60088146f83ff770324de53047c271c75db8a30af1b97656fd19f2e516c2261b12527ac8820984cc0e98ca57098f2c864fc60d1d25489b5f9b92400e6013a9d2c03251cec0545c2d84267f9938ad9c1e33578ce997e73e7e7f3479bb39f1c5441c9146c35afb39857d0ed763c696eb14cde55824fa66196f7b443c702dcd0616ba79d32bd18651ecf1f68bc8afe398f48ba9d469848dd17dd90a78ad298136fdd67b935e21f2b202df4c01e200d5a397"}, {0xc0, 0x115, 0x3ff, "4fa2f51acbde15d29bfbc77fc71409705a6497d4a5bb98c36ecb5252fa592fe3c712962a008a2ac425eccac01e273660de4e335d0abf83c958867c618cfc8e68a260388c797c01fe5704671252f870f5bb85b2474d2700d81b3590ac6af2f855987b7726c1025344ec00cf94722f8dab675e9108aaf1d54ab60c3cf9ea2e8e4d5108d942edeab2ab70bdc540edc834a9e85afd7e8d884c8022027a941adec6cd35b40ad163ef93519a"}, {0x18, 0x1ff, 0x8, "4338d524342e"}, {0x30, 0x101, 0x1, "774e6b830e414f884880587641fdf97c22fae0ea88f1ac9dcc17e646"}, {0x50, 0x119, 0x80000001, "416831cef7143c0f6ea40d3368763c7de9297f433e472eb1d8c68d718a36d90d26b3fa6ef528732f2c5edbaea35f39b3acd3e5a44491a4d0362df086c631c4"}], 0x290, 0x95}, 0x8}, {{&(0x7f0000004a40)=@sco={0x1f, {0x80, 0x20, 0xfffffffffffffffc, 0x2, 0x100, 0x2}}, 0x80, &(0x7f0000005d00)=[{&(0x7f0000004ac0)="de9dfd52f9539d48ac86dd454de9a82c7e9be61c5a3ce465bb66cf14ec6417d5a161a0d11394ee9672e384738cd93082e4c6fa06ccd48ab44ef48d3636b06465e23d3d07bb05ffd4808c789335c7794b25893ffd12c3746de14dc7f11e85f371a2559ba5cbec800cbbdfa8003c491e031b5e257f89e3846b90ccaaa1eb1b888fb989eacfb9ae73c9a13ee51f30c44cb11ef35b5135e5ac16454f652f5a7cb8fda122933b30cd5532ff096dedf34a554cef162f52151409fcc0f48bfab11e4997e1c8750be3ed03582f62008f502f3f7582c93d381c4ea49fb27d58430bce1b3bf14e2a95dfaa972843972898b0d032bc8ff18ceeab2d1bfb410e2a348ddbb770d85d7739eac2191c3c19258204f5f8b4e7390195279e0e360b1a512f984842d70f46ad7c465bc70e2ae15399d50b8c4e3580b0d32f1d54725fcb6a01d419d5bfea8726339246508cb3a6f8f54888a8d45b9ec2f04e092dffad9cc1083f9fba71a0be05b623d3c6c8b1cd4d978590b5811c09b42cae76dd555671ebe4fa2778ad506d67ffc176cd361701896fe1d9e3bd38a1e4e74d4637c04ac3415fb44ba2137e54a8652298d54068df6fd131e6094c722bdc2e4274062b5634371f419f5d2446e8514bc9637f8d0b024313423276c0d8dec1f22edecdede1210e9d5c67158533b5cacb584afb0cc66359a0834c364d09e86267a44e4fa55cab0e64159af9b200cd39bb9f83f4a86dcb440442b48fb2dfcd86ea691721f5cadf795e36b0c8de592bcba6655dccfebcd24c16d226100fcaa74fdc81107d6c84c0b2d7caaf9aa8368b20c26d91665650bd6e92bfe647e3942e571d6d99b0ceb66f2a26d9f300877259f1bb43ec51d9868ae20ff2e8cb390d86da60f30839812f80e239fb9c6556e3bddbc7c09c0d5039dbe478be2aa95c734a7334d34c2b1c2aa537c020463fc6fa75a89fed4d1bb74cc25676272d96c89dbd51ba299705b78d30d18e572557aca10dd0a81ac280c10afe34746960a278836c67da2f4dcf1059b5a42f2fcac12f4ac3ae7aa1a2a76f2bc6403f62a91834798e06ffb10561405b2b92b41c3c49d7709d249335fa804eafc99802af6be6e8c82f204ecfa97fb49cf8c6f6238b4b707b55d969d86c705157ca6fc98d75254ba79664e8f40afc7e7c151557e4ed62015ef53c2f871838c003ac5862a8fc6c299ac37accef888ca7647bf2fb6d77571f400b6842df87b5ece8dbf22e1cd2a8e7c174ee185a51225df4d8b97a5835bfdb80ba0320bbbb176363821ab74488ea9ad693910ae5150e6d1ba3ddb99193ea93e4997d057a24d9dfc2239a8048c81b9a65bc66f7a81b4cc8540ecb9616e29f3786a274758eef5fb784dac7561e0da673b6563a7f1ff818d733f5e32e9be10df2e6ea6b2951fd84e711e32585081387f9d02eaafcc1d862f1326c25f48b04bd978822f429988746ca20cbfdc39a2588bc024ccb66073b25d682e6e9daa10c8f2dd11a7be9b24f368ab7e00c08289a4b234f3c470747a65951726668cc31a3fb59007262bd33f017c2e1d6b599a31a3a6ceac05ce07dd6be946c11116efda1ae6cf7d37f194fe430f973a97f34b0fc2a36ecc6f6d15a017c80cc613928dfe4b002138c1b54752650df2f40ee8ba168458a82cf97843039279b241559e566df302126f755fe9c4b6b5e2b8a359d9fd8777ec13bb7eb9e2af28f4eec4a747448508df45678a9e3faf4d352361dbd7ee21badbe6002687dc8708f386714c3f383638a31911efb1b2c4851b3176da159453e803d591e3f767d19ae8c49a345cc47da826f79cd9849dc90aeb489e34d2222cc5a55d9dd1dc09e3ed3faf15955e8f1d12acad3f4e62987fd2fd5b75b523b4485129938f4aa37825f8f405b0f3bd3eac996e7fdb7e8a9ef158517b3a6ca7549d774e7077113c3943073ee748ad1d5edf1aa090e5391dbfd256d5e0413c0d9e38a779c17224ec2cf98cdf1399fa3c0fb6da58bc630ce3eca52d44b3c2ac79d0530579877740f5f71a4ccf44597d279046aa37fbefe1e9d69fa2b477d7801e1d309cae5a0c3458629f3cfda1d86a315f6f8b78a2a7e96725317da6b401b66461d301102e36ed2fa0558e9ab0bb176f23ebd9c67c281be23942cd411531e594bde1e3a1dc29c03102a9a64f490d1ff3544d8221abb5f99644f5cdbd226caec0ee7e23f3fd57076b396a4e4bc7f20f92fc25953fdc94f6b0c2055c3aec14878628f658781045213de415e3025b9e6f63348376cfc056246a7bb69717366e1184f5ae39ac491fa78c10be048f23da831cf32e16096dc300a9b095e513fec3824f75ea9f4f7d4755bcd00d4a85447dfb5cd69105c911701d49df95a50adfe41c83d0c1fbce1d3cd7774971bc53ab3085c6a985e31c9fb35a700763486a2aadf3becb4705463db9f7cf55cfe663d59ec75a39040009e64ba1329b7236678595236a03f2ce57e80fbd898efd3e43ba469fb4bf61f439d1d37e4f84ae587299a9753df37c8406bff46b2f74a3050e96b3885387c00453173c0394f7b89c5ee2a2e70d8acc39a5dd1a6fdc356dfabc81c9a3e355e75d696b77e5470a86af71bda3c9fdc4b6f17b30031cc347daf8e2ac3853cfcc51997199fff6e4027931248925a403c71c974c51b45d8c3c06af5bb16abad6029dd5313922a445551ba95d1d58bca539b8d363a73faf1a8d9dd584399412116c88973c8ebbb9ee3ca30a960af991bfa537baa9586c23957fd889aabbd3914b207a206ba98bc77668a1d3378e07e7ea6410d46393b0ff83c30e923fa2d7cb528de5f7963b76d7a791bc95c6a5119c5592e07dc18c0b37de2c284159f17fd12320de5b8abae4e39a2eac31e20666c06007c4db8bb122d97559d17d9cdc06c11574ada47ff6a1de41bf27678cd616d1a584247e6e5f5b94662424a63e274cd4366d0644dc4dc681951db314aebe483e15b656f77b9058a795ac8911503cc512fdd9ae7d7da35be55616051c1e2491cd11b1b003759b5a20f98da8b88a2199290841493e43025b5a9281f9c3d1c8503ba9543691c288408dddbfa357714f2cfba8dadef8bff89df0612fe9c8b1a8b11a4b17c500a781bff99e042fa556246a6cc6331bf78b0f7cd69f5c16efc008dd5886f95a16698b5117d8347d20f7120114db087a2a4226a45aa019b82291033527313d2d3564ed8133a7b4ec31ea44a06e72e6a8a99f31a9551763c123213e1df3a1e52cac78c7826c3d1beaffed228c2d69f5ead17b3f0ba2d0d8a23ba83acfc59c5c79e3e239ee713401958b3d1bad710aa9942e64ba009e2fe85a8c3bc35aa6d8393b5e2cdc0b4000925bf6def55dfcfd77ba90d95f1e983c43f50bab09a203066a5da53d620e7b6a091b13a2c1bce554e1b6032ab19eef28b219f79b3d1896a3c47aff1b5d722780007ca655ab7c438180a1affd4a7d8798545f150515191ac05fcc5a28b31551384c28cc74ea0c80d6acb1369a977893fc0745443e8bd86e23e2da68594f5d0902a60b72a12ac3b35b24ce9b5f9c2f967ce3ddda4e5fceb65e93ebddc171c5bed83dff4c5c25154683c9c469b410976f605abf823cd3d65013baa141f20b654ed4efed7beef4cf69141c159846048f08c4deff228de50a76918ada5e753c3e8f75ef7ad1ee700612437244102f69119602e0a76c304eb7f303fb2755ba7fe1deba5829a48dbba47dd7b694c60911cfa57ebcc44dfd45b5bdf4b25336420c2883f20dc181e7b1cac777a41eddabdf40502a9160a7f9c993527979502462764605034d58482ee8014f03aa09574cd1ef174533252b649dd981f9e8882d4045e213242175bf41da2806f46ecd39fd74a87b674d5836f106b71e3296a026c1f4c87221a4cfcf75c7a4d0bf7d111d6aa499ff8b0c79dd3af1666d0781b69113a02a0d56104b4f196b5b77812d8c9bd65f7236eec206a0f51d3f605e58ca7beb741a3573800005a6a740ac933fb22c417ed1f49aebdfbd84cc4d56527e328f23a72c673d420fe6448f09d57f0ba51c751986dea92e020bd513a7375f70a7a90da09cc94aff2281a0d0bd3ae9aca4c69763c509328b8b4ad29baf4662f4530d8d9b7dfcb159aca16089731fb3ef93ce654dbf096c944969ccb7775723f197f1179a407461c01c9db3973aae0c0da7c4de630475ed6dd9941b799ee9883f0836334811efa99139f410b28ac709a479617c5eee2e57292d20b8f3dd3e714213faabfbf0127482510b08adec0bfff899cae860d3e1244bac6afc8e6e58a52a6c3c7adcdc19f007b2cf78b734e7fda921b3db9137b261b525406432861bc75d77b54efba0ba73079e7b9af19e160d0f9f55136418164cb8c43e818f05649f7d981b6bae77d4aa965e80e8587fa88b2109921b434d995b1b1c4e46134558696ae9669e4ac86f1c986a5e30fa6a2af123ea6bc995100d13fa715f658730c0e58aee96c1fca299f920076a4fa1f4c362788ca9121c9442dba08c3a967af0049a8e3e08faa3cd24e8e77627e9c2c9cad97811b75a29205355092c4cdc6b8a3e9933636234b031cece1702574fbff766901cf50157f2fd90ac6ddf2739d6708f795ceabb6da4e2d02c18bb14d283bb54d2802fbfd9ec5c1aa3d52a4ad49c006585501cfc413e65e73e8c93cb430ddd61f2be81b90e59e4215d2533275d52493ec075c66209bda46be3d764771a9c497a7a94876529f76717f7db3e8f72521fc0acad366149dbe639bb0c784a06366fb4e1a08b02cff59e02d1247399724ec5772a31b22d32455093a9966a35a9918ac685f5f6bfb60081b72113495f6b706ab883bb9fd5efe3da838d140027f6a633d3f0a7b7301593f13d85d8dd9c368d0857419507a0403e83d194db96c0b9a0407f004faab31281726652eaf35b4b810a294b81211f67f6e27b52879add2d899673db3df9fac609c9645a4961d4f2ef066a5af32a82acc5ffaeea491f4fb0bce6347f1d2b40091cae4f74758287cc59daef467a71374a2a50bddab062edd20f4a1c732d14eb5f55a453450810af44d1e755a10ae4b50120499db2872943e9e81942e349d742c0e7dc0b8501082d6af7cabacc9e9f33612a09dbaa48d6472d6e6e1fc946782ec22dcd0a75577774c8648f04ef5decf5ef9c1f9e1a93e3ec40b726b3105bf58dce69f7b248dee6de682fad5213fdab45bb66caf4bebf8ed451098667c81310a349f7fa173c514291a70c1ac34198b312de9d78abd3d459b5e4a62583885b3712f38dc7defca129dcd40ef8b9d9f9a6390deaf08efebd492455a5bbfb4d25eceaa477f3f675c3d6f0545e4a8c0ec9d4bbe778a3b28451b3a186f7b268e2e79c4caf4118db5f6673b5baa0b180c2ad1625e3c6419736eaad7c5a8624a4575821db607a8db5b706fd3f596c4dd34fd69f59ab8114727a575f506f4c388772a61c4ca7feb0e5fb91be632a6a7792afce0544f7a3c808243025eaa1264cad3aec4e791fbd34ada0d483aad33dc3e36fd632b95d3814fb970922ba8295d681c36106fb4fd3bd6cb34dbb413e99e5f738e6cdff4b62d5eb99bd46016ab19a27e6ab52d53d128eb2cffd4ef13660da33150e846a8f2021a523b49b48c806c0fc73dc9b83186ca049c0576dcbf4aa1d5fc53a7869585421717556d6c37e6ec57eafd0b96c498f9221a2481cb494b06e4fb6ed0bdcde8f0b811a75ebdda688324b33b5f9fa5fd8b6298b51edea2e8f4f040dea97ec7b2312adb6f6373d560b1fc1d06d6038b7663c94822a45e90d54bf6035787789c242e5d03d51d42ac8efd0291139c1555", 0x1000}, {&(0x7f0000005ac0)="57ecbdc3c424f75a6937aad28b902a7adab3f1ae16f10109ee6afcb1e0e61a5f33c8db6b7e2348c159317ac2398a3706b1f6e13b255ba2d4a371084b1820ef19b59f3a7b8679c69fb778cb826082", 0x4e}, {&(0x7f0000005b40)="17ff3dc91952957ecc93110398ee7277e5aeca1eab0f9356c56b685deb3ff46fe28fba6347c6f947093798d2d56885c3aa70c9b3963bd471ba04a50c27b1f27fabaeda443be832b5d3dabbac846d350166a405c254ef32bb0e97c5b2664c3048440e1211c7dbe2b183662c79045c4c89647d26d0782e9b14b73d3f6d8d887c87489fdd517d2905412c75f350d8b7a43021f5ed0d31b3", 0x96}, {&(0x7f0000005c00)="4f9bb76a66e13a7f53b51cb4e9b9ec95ffc9612632c01c6495b9414522889137beee2f5f5b8cdf71779c08f7db33a01ee997b16e9d7fa2b730d11a2c09c0fc1916193c5e101c4a33d3a272b33027869306ceb49778413212622266b430bb1f7f08a1dafee6d13236405b1530827b3d4f17e1d98f4ce06ec7f6d11a23fbbffa0fa8c9746552132af3f928b128c8be735d2974304fefe7133f49f0d7f4117aa2387e069bc367a8e9d47c1b02f55bbf983c8df11414c125edc94be0898f582586922862479ba03b9a93bb017965d9ff08d43a784cf20637741c7544e202252de885e2d34e7221f75e67dc9fc7da", 0xec}], 0x4, &(0x7f0000005d40)=[{0x68, 0x10d, 0x7, "81244d16ba11c7cada3d801d7ae65df9bb477662594417a01cd74da64d2fffda5c997736e8fd34c0d1906d991ff31ab0d4763d18ff1f8b0bb5eafa4ece045918410a2dbbe79ac428905fc7402f3650b1cc92"}, {0x50, 0x116, 0x8000, "e98680137bf546d14305727c965d562d349d708f16383fa861bfb921111c3df0531c208922fd1ed9547ad6a686c1b46420765a487ae77f3114fcc9e879a57a"}], 0xb8, 0x4000}}], 0x6, 0x80) 2018/06/05 09:47:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:37 executing program 0 (fault-call:2 fault-nth:1): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:37 executing program 6: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff00000002fffffffb030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xe803]}, 0x10) 2018/06/05 09:47:37 executing program 7 (fault-call:1 fault-nth:0): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x5e00]}, 0x10) [ 716.265304] FAULT_INJECTION: forcing a failure. [ 716.265304] name failslab, interval 1, probability 0, space 0, times 0 [ 716.276688] CPU: 1 PID: 18815 Comm: syz-executor7 Not tainted 4.17.0+ #84 [ 716.283632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.293002] Call Trace: [ 716.295613] dump_stack+0x1b9/0x294 [ 716.299264] ? dump_stack_print_info.cold.2+0x52/0x52 [ 716.304478] should_fail.cold.4+0xa/0x1a [ 716.308562] ? unlock_page+0x1d0/0x2b0 [ 716.312466] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 716.317600] ? debug_check_no_locks_freed+0x310/0x310 [ 716.322528] FAULT_INJECTION: forcing a failure. [ 716.322528] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 716.322837] ? find_held_lock+0x36/0x1c0 [ 716.338750] ? cgroup_max_descendants_write+0x70/0x280 [ 716.344049] ? check_same_owner+0x320/0x320 [ 716.348374] ? rcu_note_context_switch+0x710/0x710 [ 716.353300] __should_failslab+0x124/0x180 [ 716.357534] should_failslab+0x9/0x14 [ 716.361331] kmem_cache_alloc_node+0x272/0x780 [ 716.365908] ? check_same_owner+0x320/0x320 [ 716.370226] ? __check_object_size+0x95/0x5d9 [ 716.374983] __alloc_skb+0x111/0x780 [ 716.378693] ? skb_scrub_packet+0x580/0x580 [ 716.383008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 716.388541] ? _copy_from_user+0xdf/0x150 [ 716.392686] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 716.397871] ? rw_copy_check_uvector+0x2d3/0x3a0 [ 716.402628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 716.408434] ? import_iovec+0x24b/0x420 [ 716.412403] ? dup_iter+0x270/0x270 [ 716.416030] pfkey_sendmsg+0x250/0x1050 [ 716.420007] ? _copy_from_user+0xdf/0x150 [ 716.424151] ? pfkey_spdget+0xb10/0xb10 [ 716.428134] ? security_socket_sendmsg+0x94/0xc0 [ 716.432890] ? pfkey_spdget+0xb10/0xb10 [ 716.436861] sock_sendmsg+0xd5/0x120 [ 716.440576] ___sys_sendmsg+0x805/0x940 [ 716.444571] ? copy_msghdr_from_user+0x560/0x560 [ 716.449337] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 716.454883] ? proc_fail_nth_write+0x96/0x1f0 [ 716.459397] ? __fget_light+0x2ef/0x430 [ 716.463369] ? fget_raw+0x20/0x20 [ 716.466815] ? find_held_lock+0x36/0x1c0 [ 716.470886] ? kasan_check_write+0x14/0x20 [ 716.475670] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 716.480598] ? wait_for_completion+0x870/0x870 [ 716.485181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 716.490713] ? sockfd_lookup_light+0xc5/0x160 [ 716.495206] __sys_sendmsg+0x115/0x270 [ 716.499087] ? __ia32_sys_shutdown+0x80/0x80 [ 716.503497] ? __sb_end_write+0xac/0xe0 [ 716.507479] ? fput+0x130/0x1a0 [ 716.510777] ? ksys_write+0x1a6/0x250 [ 716.514582] __x64_sys_sendmsg+0x78/0xb0 [ 716.518650] do_syscall_64+0x1b1/0x800 [ 716.522621] ? syscall_return_slowpath+0x5c0/0x5c0 [ 716.527544] ? syscall_return_slowpath+0x30f/0x5c0 [ 716.532480] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 716.537843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 716.542681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.547862] RIP: 0033:0x455a09 [ 716.551046] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.570343] RSP: 002b:00007f9bd615dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 716.578050] RAX: ffffffffffffffda RBX: 00007f9bd615e6d4 RCX: 0000000000455a09 [ 716.585310] RDX: 0000000000000000 RSI: 0000000020f56000 RDI: 0000000000000013 [ 716.592572] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 716.599847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 716.607106] R13: 00000000000005c9 R14: 00000000006fdb78 R15: 0000000000000000 [ 716.614397] CPU: 0 PID: 18827 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 716.619721] BTRFS error (device loop2): superblock checksum mismatch [ 716.621331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.621337] Call Trace: [ 716.621357] dump_stack+0x1b9/0x294 [ 716.621374] ? dump_stack_print_info.cold.2+0x52/0x52 [ 716.621396] should_fail.cold.4+0xa/0x1a [ 716.653809] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 716.658936] ? debug_check_no_locks_freed+0x310/0x310 [ 716.664143] ? debug_check_no_locks_freed+0x310/0x310 [ 716.669341] ? print_usage_bug+0xc0/0xc0 [ 716.673398] ? graph_lock+0x170/0x170 [ 716.677187] ? do_raw_spin_lock+0xc1/0x200 [ 716.681412] ? graph_lock+0x170/0x170 [ 716.685202] ? lock_acquire+0x1dc/0x520 [ 716.689165] ? graph_lock+0x170/0x170 [ 716.692975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.698502] ? should_fail+0x21b/0xbcd [ 716.702380] ? __lock_acquire+0x7f5/0x5140 [ 716.706605] __alloc_pages_nodemask+0x34e/0xd70 [ 716.711263] ? _parse_integer+0x13b/0x190 [ 716.715406] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 716.720421] ? find_held_lock+0x36/0x1c0 [ 716.724482] ? check_same_owner+0x320/0x320 [ 716.728807] cache_grow_begin+0x6e/0x6c0 [ 716.732863] kmem_cache_alloc+0x689/0x760 [ 716.737012] getname_flags+0xd0/0x5a0 [ 716.740813] do_renameat2+0x31c/0x1150 [ 716.744692] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 716.749611] ? wait_for_completion+0x870/0x870 [ 716.754189] ? user_path_create+0x40/0x40 [ 716.758342] ? __lock_is_held+0xb5/0x140 [ 716.762576] ? __sb_end_write+0xac/0xe0 [ 716.766543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 716.772071] ? fput+0x130/0x1a0 [ 716.775343] ? ksys_write+0x1a6/0x250 [ 716.779151] ? __ia32_sys_read+0xb0/0xb0 [ 716.783205] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 716.788044] ? do_syscall_64+0x92/0x800 [ 716.792016] __x64_sys_rename+0x5e/0x80 [ 716.795986] do_syscall_64+0x1b1/0x800 [ 716.799862] ? finish_task_switch+0x1ca/0x840 [ 716.804344] ? syscall_return_slowpath+0x5c0/0x5c0 [ 716.809263] ? syscall_return_slowpath+0x30f/0x5c0 [ 716.814201] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 716.819553] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 716.824391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.829568] RIP: 0033:0x455a09 [ 716.832738] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.852152] RSP: 002b:00007f11fad37c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 716.860372] RAX: ffffffffffffffda RBX: 00007f11fad386d4 RCX: 0000000000455a09 2018/06/05 09:47:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200040000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 716.867627] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000000 [ 716.874884] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 716.882150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 716.889403] R13: 000000000000057a R14: 00000000006fd410 R15: 0000000000000001 [ 716.905487] BTRFS error (device loop2): open_ctree failed 2018/06/05 09:47:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:38 executing program 0 (fault-call:2 fault-nth:2): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x24]}, 0x10) 2018/06/05 09:47:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200002000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') userfaultfd(0x80000) [ 717.081395] BTRFS error (device loop6): superblock checksum mismatch 2018/06/05 09:47:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) [ 717.138946] BTRFS error (device loop6): open_ctree failed [ 717.332618] FAULT_INJECTION: forcing a failure. [ 717.332618] name failslab, interval 1, probability 0, space 0, times 0 [ 717.343989] CPU: 1 PID: 18873 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 717.351024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.360367] Call Trace: [ 717.362957] dump_stack+0x1b9/0x294 [ 717.366579] ? dump_stack_print_info.cold.2+0x52/0x52 [ 717.371773] ? inode_permission+0xb2/0x560 [ 717.376018] should_fail.cold.4+0xa/0x1a [ 717.380072] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.385170] ? walk_component+0x25f0/0x25f0 [ 717.389492] ? dput.part.26+0x26d/0x780 [ 717.393458] ? find_held_lock+0x36/0x1c0 [ 717.397518] ? find_held_lock+0x36/0x1c0 [ 717.401574] ? check_same_owner+0x320/0x320 [ 717.405882] ? filename_parentat.isra.57+0x412/0x540 [ 717.410972] ? rcu_note_context_switch+0x710/0x710 [ 717.415905] ? getname+0x20/0x20 [ 717.419276] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.424814] __should_failslab+0x124/0x180 [ 717.429059] should_failslab+0x9/0x14 [ 717.432870] kmem_cache_alloc+0x2af/0x760 [ 717.437014] ? getname_flags+0xd0/0x5a0 [ 717.440992] getname_flags+0xd0/0x5a0 [ 717.444791] do_renameat2+0x381/0x1150 [ 717.448683] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 717.453610] ? wait_for_completion+0x870/0x870 [ 717.458181] ? user_path_create+0x40/0x40 [ 717.462326] ? __lock_is_held+0xb5/0x140 [ 717.466388] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.471911] ? fput+0x130/0x1a0 [ 717.475176] ? ksys_write+0x1a6/0x250 [ 717.478966] ? __ia32_sys_read+0xb0/0xb0 [ 717.483023] ? do_syscall_64+0x92/0x800 [ 717.486992] __x64_sys_rename+0x5e/0x80 [ 717.490961] do_syscall_64+0x1b1/0x800 [ 717.494843] ? finish_task_switch+0x1ca/0x840 [ 717.499330] ? syscall_return_slowpath+0x5c0/0x5c0 [ 717.504250] ? syscall_return_slowpath+0x30f/0x5c0 [ 717.509174] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 717.514535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.519368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.524553] RIP: 0033:0x455a09 [ 717.527742] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.547044] RSP: 002b:00007f11fad37c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 717.554758] RAX: ffffffffffffffda RBX: 00007f11fad386d4 RCX: 0000000000455a09 [ 717.562034] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000000 [ 717.569302] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 717.576566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/06/05 09:47:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000010005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x3f8]}, 0x10) 2018/06/05 09:47:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0/file0\x00', 0xee8, 0x7, &(0x7f0000002500)=[{&(0x7f00000001c0)="05c888aaa3e2eda353263a65df8913b27f42851f25746d56ce40a2d63831faa757ab2fa729c91e75f2bd7ba623dba7ba09d8a6535d16316b54af81012ea99093fe2ffe9251a2437d9db5f82ca2e81b5f5f604c39b74876d2aeb49cff0d9960471f6aac89fdc4dfe64337bde69e7b3fa414529c0e912dbba0c3f32a68db5780e060e1e77e3810a0055506531819e6da80d2c17fad6542c656c294ee8756202406d4c998a92f8b309b7146f88388ed50020549587d6230f2f7781040", 0xbb, 0x9}, {&(0x7f0000000380)="262bf5fa0df598bf3d373052e4c22e8a1a951489f11116df01b6048a7196a046002e88c556d2a5859b433baeab0c3951e79bdf5db86f3357e884853885178e02fa89e71a05ac7176328ee8c0550442b1d7e3aca662dcfc4c1c9a9fb8f3b306aca8f3ade8e3e8cb7f4270f2c51f4439f0478323b9a36c56f3f8593f0eccc47b3725db9baf1daf6df946c496c3549759dedfb88eea7629d5", 0x97, 0xfffffffffffffe01}, {&(0x7f0000000500)="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", 0x1000, 0x7}, {&(0x7f00000002c0), 0x0, 0x5}, {&(0x7f0000000300)="0d61196fe16471e42965e23a83970d35ee42e103d923f59946492c3cc8652292", 0x20, 0x1}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000000440)="93d68ac00aca269d75fecd6cc23c8806a14de2172f5f743597682dd8f9f6c733dd3631440c2cf1ebe48f7504fad57cda2eed48a18d88796aee", 0x39, 0xdf}], 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000027c0)={0xffffffffffffff9c, 0x6, 0x1, 0x9, &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) perf_event_open(&(0x7f0000002700)={0x2, 0x70, 0x8, 0xcf62, 0x20, 0x7ff, 0x0, 0x0, 0x40, 0x9, 0x7ff, 0x1, 0x7ff, 0x4, 0x2, 0x80000000, 0xc7, 0x2, 0xffffffff, 0x6, 0x8, 0x80000001, 0x5, 0x7, 0xcc, 0x10000, 0x7, 0x9, 0xc6, 0x7fffffff, 0x20, 0x3, 0x40, 0xffffffff, 0x1, 0x6, 0x1, 0x7, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000026c0), 0x8}, 0x0, 0x0, 0xd99, 0x7, 0x4, 0x4, 0x2}, r0, 0x5, r1, 0x1) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept(0xffffffffffffffff, &(0x7f00000025c0)=@nl=@unspec, &(0x7f00000002c0)=0x80) accept4$unix(r2, &(0x7f0000002640)=@abs, &(0x7f0000000480)=0x6e, 0x80000) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:39 executing program 0 (fault-call:2 fault-nth:3): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:39 executing program 7 (fault-call:1 fault-nth:1): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:39 executing program 6: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 717.583828] R13: 000000000000057a R14: 00000000006fd410 R15: 0000000000000002 [ 717.655895] FAULT_INJECTION: forcing a failure. [ 717.655895] name failslab, interval 1, probability 0, space 0, times 0 [ 717.667234] CPU: 1 PID: 18889 Comm: syz-executor7 Not tainted 4.17.0+ #84 [ 717.674341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.683712] Call Trace: [ 717.686325] dump_stack+0x1b9/0x294 [ 717.689985] ? dump_stack_print_info.cold.2+0x52/0x52 [ 717.695200] ? is_bpf_text_address+0xd7/0x170 [ 717.699721] ? kernel_text_address+0x79/0xf0 [ 717.704146] ? __unwind_start+0x166/0x330 [ 717.708308] should_fail.cold.4+0xa/0x1a [ 717.712378] ? __save_stack_trace+0x7e/0xd0 [ 717.716701] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.721806] ? save_stack+0xa9/0xd0 [ 717.725426] ? save_stack+0x43/0xd0 [ 717.729045] ? kasan_kmalloc+0xc4/0xe0 [ 717.733033] ? kasan_slab_alloc+0x12/0x20 [ 717.737177] ? find_held_lock+0x36/0x1c0 [ 717.741252] ? check_same_owner+0x320/0x320 [ 717.745573] ? rcu_note_context_switch+0x710/0x710 [ 717.750525] __should_failslab+0x124/0x180 [ 717.754953] should_failslab+0x9/0x14 [ 717.758756] kmem_cache_alloc_node_trace+0x26f/0x770 [ 717.763872] __kmalloc_node_track_caller+0x33/0x70 [ 717.768803] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 717.773583] __alloc_skb+0x14d/0x780 [ 717.777305] ? skb_scrub_packet+0x580/0x580 [ 717.781624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.787159] ? _copy_from_user+0xdf/0x150 [ 717.791313] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 717.796343] ? rw_copy_check_uvector+0x2d3/0x3a0 [ 717.801115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.806648] ? import_iovec+0x24b/0x420 [ 717.810620] ? dup_iter+0x270/0x270 [ 717.814261] pfkey_sendmsg+0x250/0x1050 [ 717.818228] ? _copy_from_user+0xdf/0x150 [ 717.822374] ? pfkey_spdget+0xb10/0xb10 [ 717.826533] ? security_socket_sendmsg+0x94/0xc0 [ 717.831281] ? pfkey_spdget+0xb10/0xb10 [ 717.835515] sock_sendmsg+0xd5/0x120 [ 717.839222] ___sys_sendmsg+0x805/0x940 [ 717.843205] ? copy_msghdr_from_user+0x560/0x560 [ 717.847965] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.853502] ? proc_fail_nth_write+0x96/0x1f0 [ 717.857997] ? __fget_light+0x2ef/0x430 [ 717.861972] ? fget_raw+0x20/0x20 [ 717.865416] ? find_held_lock+0x36/0x1c0 [ 717.869474] ? kasan_check_write+0x14/0x20 [ 717.873713] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 717.878648] ? wait_for_completion+0x870/0x870 [ 717.883235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.888765] ? sockfd_lookup_light+0xc5/0x160 [ 717.893429] __sys_sendmsg+0x115/0x270 [ 717.897326] ? __ia32_sys_shutdown+0x80/0x80 [ 717.901729] ? __sb_end_write+0xac/0xe0 [ 717.905703] ? fput+0x130/0x1a0 [ 717.909075] ? ksys_write+0x1a6/0x250 [ 717.912887] __x64_sys_sendmsg+0x78/0xb0 [ 717.916956] do_syscall_64+0x1b1/0x800 [ 717.920859] ? finish_task_switch+0x1ca/0x840 [ 717.925350] ? syscall_return_slowpath+0x5c0/0x5c0 [ 717.930287] ? syscall_return_slowpath+0x30f/0x5c0 [ 717.935215] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 717.940584] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.945425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.950604] RIP: 0033:0x455a09 [ 717.953777] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.973117] RSP: 002b:00007f9bd615dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 717.980863] RAX: ffffffffffffffda RBX: 00007f9bd615e6d4 RCX: 0000000000455a09 [ 717.988125] RDX: 0000000000000000 RSI: 0000000020f56000 RDI: 0000000000000013 [ 717.995389] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 718.002649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 718.009910] R13: 00000000000005c9 R14: 00000000006fdb78 R15: 0000000000000001 2018/06/05 09:47:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 718.062777] FAULT_INJECTION: forcing a failure. [ 718.062777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.074644] CPU: 1 PID: 18901 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 718.081587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.090961] Call Trace: [ 718.093580] dump_stack+0x1b9/0x294 [ 718.097762] ? dump_stack_print_info.cold.2+0x52/0x52 [ 718.102975] ? graph_lock+0x170/0x170 [ 718.106812] should_fail.cold.4+0xa/0x1a [ 718.110906] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.116032] ? debug_check_no_locks_freed+0x310/0x310 [ 718.121228] ? lock_downgrade+0x8e0/0x8e0 [ 718.125385] ? kasan_check_read+0x11/0x20 [ 718.129534] ? set_nlink+0xaf/0x140 [ 718.133168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.138707] ? generic_permission+0x121/0x520 [ 718.143384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.148920] ? perf_trace_lock_acquire+0xe3/0x980 [ 718.153766] ? inode_permission+0xb2/0x560 [ 718.157996] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 718.163204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.168828] ? should_fail+0x21b/0xbcd [ 718.172723] ? pick_link+0xb00/0xb00 [ 718.176453] __alloc_pages_nodemask+0x34e/0xd70 [ 718.181139] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 718.186167] ? dput.part.26+0x26d/0x780 [ 718.190151] ? find_held_lock+0x36/0x1c0 [ 718.194226] ? find_held_lock+0x36/0x1c0 [ 718.198319] ? check_same_owner+0x320/0x320 [ 718.202652] ? filename_parentat.isra.57+0x412/0x540 [ 718.207764] cache_grow_begin+0x6e/0x6c0 [ 718.212015] kmem_cache_alloc+0x689/0x760 [ 718.216264] getname_flags+0xd0/0x5a0 [ 718.220077] do_renameat2+0x381/0x1150 [ 718.223974] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 718.228913] ? wait_for_completion+0x870/0x870 [ 718.233506] ? user_path_create+0x40/0x40 [ 718.237657] ? __lock_is_held+0xb5/0x140 [ 718.241740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.247274] ? fput+0x130/0x1a0 [ 718.250555] ? ksys_write+0x1a6/0x250 [ 718.254364] ? __ia32_sys_read+0xb0/0xb0 [ 718.258433] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 718.263289] ? do_syscall_64+0x92/0x800 [ 718.267267] __x64_sys_rename+0x5e/0x80 [ 718.271242] do_syscall_64+0x1b1/0x800 [ 718.275139] ? finish_task_switch+0x1ca/0x840 [ 718.279646] ? syscall_return_slowpath+0x5c0/0x5c0 [ 718.284582] ? syscall_return_slowpath+0x30f/0x5c0 [ 718.289520] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 718.294917] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.299775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.304967] RIP: 0033:0x455a09 [ 718.308152] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.327636] RSP: 002b:00007f11fad37c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 718.335352] RAX: ffffffffffffffda RBX: 00007f11fad386d4 RCX: 0000000000455a09 [ 718.342636] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000000 [ 718.350086] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/06/05 09:47:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) [ 718.357353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 718.364613] R13: 000000000000057a R14: 00000000006fd410 R15: 0000000000000003 2018/06/05 09:47:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000020005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:39 executing program 7 (fault-call:1 fault-nth:2): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x34000]}, 0x10) 2018/06/05 09:47:39 executing program 0 (fault-call:2 fault-nth:4): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 718.604250] FAULT_INJECTION: forcing a failure. [ 718.604250] name failslab, interval 1, probability 0, space 0, times 0 [ 718.610972] FAULT_INJECTION: forcing a failure. [ 718.610972] name failslab, interval 1, probability 0, space 0, times 0 [ 718.616165] CPU: 1 PID: 18922 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 718.634250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.643618] Call Trace: [ 718.646224] dump_stack+0x1b9/0x294 [ 718.649856] ? dump_stack_print_info.cold.2+0x52/0x52 [ 718.655044] ? perf_trace_lock_acquire+0xe3/0x980 [ 718.659884] ? print_usage_bug+0xc0/0xc0 [ 718.663950] should_fail.cold.4+0xa/0x1a [ 718.668015] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.673128] ? graph_lock+0x170/0x170 [ 718.676922] ? perf_trace_lock+0x900/0x900 [ 718.681152] ? debug_check_no_locks_freed+0x310/0x310 [ 718.686343] ? find_held_lock+0x36/0x1c0 [ 718.690418] ? __lock_is_held+0xb5/0x140 [ 718.694494] ? check_same_owner+0x320/0x320 [ 718.698816] ? rcu_note_context_switch+0x710/0x710 [ 718.703741] ? lock_downgrade+0x8e0/0x8e0 [ 718.707888] __should_failslab+0x124/0x180 [ 718.712140] should_failslab+0x9/0x14 [ 718.715959] kmem_cache_alloc+0x2af/0x760 [ 718.720108] ? rcu_report_qs_rnp+0x790/0x790 [ 718.724522] __d_alloc+0xc0/0xd30 [ 718.727978] ? shrink_dcache_for_umount+0x290/0x290 [ 718.732998] ? d_alloc_parallel+0x1e70/0x1e70 [ 718.737495] ? lock_release+0xa10/0xa10 [ 718.741474] ? mark_held_locks+0xc9/0x160 [ 718.745704] ? d_lookup+0x254/0x330 [ 718.749333] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 718.754343] ? d_lookup+0x219/0x330 [ 718.757968] d_alloc+0x8e/0x370 [ 718.761243] ? __d_lookup+0x9c0/0x9c0 [ 718.765037] ? __d_alloc+0xd30/0xd30 [ 718.768746] ? lock_rename+0x236/0x290 [ 718.772638] ? _down_write_nest_lock+0x120/0x120 [ 718.777396] __lookup_hash+0xd9/0x190 [ 718.781205] do_renameat2+0x6e0/0x1150 [ 718.785121] ? user_path_create+0x40/0x40 [ 718.789263] ? __lock_is_held+0xb5/0x140 [ 718.793339] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.798875] ? ksys_write+0x1a6/0x250 [ 718.802673] ? __ia32_sys_read+0xb0/0xb0 [ 718.806734] ? do_syscall_64+0x92/0x800 [ 718.810706] __x64_sys_rename+0x5e/0x80 [ 718.814678] do_syscall_64+0x1b1/0x800 [ 718.818560] ? finish_task_switch+0x1ca/0x840 [ 718.823056] ? syscall_return_slowpath+0x5c0/0x5c0 [ 718.827984] ? syscall_return_slowpath+0x30f/0x5c0 [ 718.832918] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 718.838294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.843143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.848330] RIP: 0033:0x455a09 [ 718.851520] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.870978] RSP: 002b:00007f11fad37c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 718.878787] RAX: ffffffffffffffda RBX: 00007f11fad386d4 RCX: 0000000000455a09 [ 718.886484] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000000 [ 718.894357] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 718.901620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 718.908881] R13: 000000000000057a R14: 00000000006fd410 R15: 0000000000000004 [ 718.916169] CPU: 0 PID: 18925 Comm: syz-executor7 Not tainted 4.17.0+ #84 [ 718.923113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.932477] Call Trace: [ 718.935087] dump_stack+0x1b9/0x294 [ 718.938726] ? dump_stack_print_info.cold.2+0x52/0x52 [ 718.943928] ? perf_trace_lock_acquire+0xe3/0x980 [ 718.948793] ? rcu_is_watching+0x85/0x140 [ 718.952970] should_fail.cold.4+0xa/0x1a [ 718.957036] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.962150] ? lock_acquire+0x1dc/0x520 [ 718.966114] ? graph_lock+0x170/0x170 [ 718.969908] ? find_held_lock+0x36/0x1c0 [ 718.974232] ? __lock_is_held+0xb5/0x140 [ 718.978296] ? check_same_owner+0x320/0x320 [ 718.982604] ? perf_trace_lock+0x900/0x900 [ 718.986828] ? rcu_note_context_switch+0x710/0x710 [ 718.991926] __should_failslab+0x124/0x180 [ 718.996168] should_failslab+0x9/0x14 [ 718.999963] kmem_cache_alloc+0x2af/0x760 [ 719.004112] skb_clone+0x1ed/0x4f0 [ 719.007665] ? skb_split+0x11d0/0x11d0 [ 719.011551] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 719.016571] ? iov_iter_advance+0x2e4/0x14c0 [ 719.020979] pfkey_process+0xb9/0x980 [ 719.024782] ? iov_iter_npages+0xe60/0xe60 [ 719.029015] ? pfkey_send_new_mapping+0x1260/0x1260 [ 719.034030] ? copyin+0xb7/0x100 [ 719.037392] ? _copy_from_iter_full+0x2b0/0xd10 [ 719.042055] ? usercopy_warn+0x120/0x120 [ 719.046113] ? iov_iter_advance+0x14c0/0x14c0 [ 719.050616] pfkey_sendmsg+0x5f4/0x1050 [ 719.054584] ? _copy_from_user+0xdf/0x150 [ 719.058730] ? pfkey_spdget+0xb10/0xb10 [ 719.062702] ? security_socket_sendmsg+0x94/0xc0 [ 719.067446] ? pfkey_spdget+0xb10/0xb10 [ 719.071414] sock_sendmsg+0xd5/0x120 [ 719.075129] ___sys_sendmsg+0x805/0x940 [ 719.079106] ? copy_msghdr_from_user+0x560/0x560 [ 719.083866] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.089402] ? proc_fail_nth_write+0x96/0x1f0 [ 719.093892] ? __fget_light+0x2ef/0x430 [ 719.097867] ? fget_raw+0x20/0x20 [ 719.101307] ? find_held_lock+0x36/0x1c0 [ 719.105363] ? kasan_check_write+0x14/0x20 [ 719.109592] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 719.114515] ? wait_for_completion+0x870/0x870 [ 719.119273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.124818] ? sockfd_lookup_light+0xc5/0x160 [ 719.129310] __sys_sendmsg+0x115/0x270 [ 719.133201] ? __ia32_sys_shutdown+0x80/0x80 [ 719.137616] ? __sb_end_write+0xac/0xe0 [ 719.141586] ? fput+0x130/0x1a0 [ 719.145724] ? ksys_write+0x1a6/0x250 [ 719.149537] __x64_sys_sendmsg+0x78/0xb0 [ 719.153592] do_syscall_64+0x1b1/0x800 [ 719.157471] ? finish_task_switch+0x1ca/0x840 [ 719.161961] ? syscall_return_slowpath+0x5c0/0x5c0 [ 719.166881] ? syscall_return_slowpath+0x30f/0x5c0 [ 719.171824] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 719.177188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.182059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.187246] RIP: 0033:0x455a09 [ 719.190418] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.209748] RSP: 002b:00007f9bd615dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 719.217453] RAX: ffffffffffffffda RBX: 00007f9bd615e6d4 RCX: 0000000000455a09 [ 719.224719] RDX: 0000000000000000 RSI: 0000000020f56000 RDI: 0000000000000013 [ 719.231978] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 719.239251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 719.246509] R13: 00000000000005c9 R14: 00000000006fdb78 R15: 0000000000000002 [ 719.333279] BTRFS error (device loop6): superblock checksum mismatch [ 719.348808] BTRFS error (device loop6): open_ctree failed 2018/06/05 09:47:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200020000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x1c01000000000000]}, 0x10) 2018/06/05 09:47:40 executing program 0 (fault-call:2 fault-nth:5): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x100000000, 0x8100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:40 executing program 6: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:40 executing program 7 (fault-call:1 fault-nth:3): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 719.583595] FAULT_INJECTION: forcing a failure. [ 719.583595] name failslab, interval 1, probability 0, space 0, times 0 [ 719.594975] CPU: 1 PID: 18963 Comm: syz-executor7 Not tainted 4.17.0+ #84 [ 719.601922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.611408] Call Trace: [ 719.614019] dump_stack+0x1b9/0x294 [ 719.617663] ? dump_stack_print_info.cold.2+0x52/0x52 [ 719.622872] ? perf_trace_lock_acquire+0xe3/0x980 [ 719.627738] ? _raw_spin_unlock_bh+0x30/0x40 2018/06/05 09:47:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='//control\x00', &(0x7f0000000080)='./file0\x00') [ 719.632178] should_fail.cold.4+0xa/0x1a [ 719.636265] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 719.641396] ? kasan_check_write+0x14/0x20 [ 719.645655] ? rcu_read_lock_sched_held+0x108/0x120 [ 719.650699] ? find_held_lock+0x36/0x1c0 [ 719.655328] ? check_same_owner+0x320/0x320 [ 719.659764] ? rcu_note_context_switch+0x710/0x710 [ 719.664713] __should_failslab+0x124/0x180 [ 719.668947] should_failslab+0x9/0x14 [ 719.672735] kmem_cache_alloc_node+0x272/0x780 [ 719.677306] ? pfkey_dump+0x56b/0x6d0 [ 719.681097] ? pfkey_spddump+0x210/0x210 [ 719.685155] __alloc_skb+0x111/0x780 [ 719.688861] ? skb_scrub_packet+0x580/0x580 [ 719.693204] pfkey_sendmsg+0x684/0x1050 [ 719.697169] ? _copy_from_user+0xdf/0x150 [ 719.701310] ? pfkey_spdget+0xb10/0xb10 [ 719.705288] ? security_socket_sendmsg+0x94/0xc0 [ 719.710035] ? pfkey_spdget+0xb10/0xb10 [ 719.714005] sock_sendmsg+0xd5/0x120 [ 719.717717] ___sys_sendmsg+0x805/0x940 [ 719.721701] ? copy_msghdr_from_user+0x560/0x560 [ 719.726632] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.732169] ? proc_fail_nth_write+0x96/0x1f0 [ 719.736666] ? __fget_light+0x2ef/0x430 [ 719.740631] ? fget_raw+0x20/0x20 [ 719.744073] ? find_held_lock+0x36/0x1c0 [ 719.748127] ? kasan_check_write+0x14/0x20 [ 719.752352] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 719.757273] ? wait_for_completion+0x870/0x870 [ 719.761865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.767406] ? sockfd_lookup_light+0xc5/0x160 [ 719.771902] __sys_sendmsg+0x115/0x270 [ 719.775779] ? __ia32_sys_shutdown+0x80/0x80 [ 719.780184] ? __sb_end_write+0xac/0xe0 [ 719.784157] ? fput+0x130/0x1a0 [ 719.787426] ? ksys_write+0x1a6/0x250 [ 719.791235] __x64_sys_sendmsg+0x78/0xb0 [ 719.795297] do_syscall_64+0x1b1/0x800 [ 719.799171] ? finish_task_switch+0x1ca/0x840 [ 719.804021] ? syscall_return_slowpath+0x5c0/0x5c0 [ 719.808943] ? syscall_return_slowpath+0x30f/0x5c0 [ 719.813866] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 719.819229] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.824068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.829245] RIP: 0033:0x455a09 [ 719.832421] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.851750] RSP: 002b:00007f9bd615dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 719.859450] RAX: ffffffffffffffda RBX: 00007f9bd615e6d4 RCX: 0000000000455a09 [ 719.866705] RDX: 0000000000000000 RSI: 0000000020f56000 RDI: 0000000000000013 [ 719.874050] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/06/05 09:47:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000400030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf3030000]}, 0x10) [ 719.881306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 719.888574] R13: 00000000000005c9 R14: 00000000006fdb78 R15: 0000000000000003 2018/06/05 09:47:41 executing program 7 (fault-call:1 fault-nth:4): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file1\x00', 0xfff, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0)="62f9b25be9ec4960ea310f5b4495f32059ae1e1667ff1dc766f3b8c28518761b657542646dd24d42d548621c90cea38fda93416d04d73cd448ca2b42df2c02c39c0a6a6a5a1c12f1c546e3af53d1f4298c3392f40f2d63a1edd1a5476e6817cf04c71949d1", 0x65, 0x9}], 0x3004400, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, [0x37, 0x0, 0x3f, 0x39]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}, 0x2c}]}) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 719.981472] BTRFS error (device loop6): superblock checksum mismatch [ 720.060697] BTRFS error (device loop6): open_ctree failed [ 720.208578] FAULT_INJECTION: forcing a failure. [ 720.208578] name failslab, interval 1, probability 0, space 0, times 0 [ 720.219997] CPU: 1 PID: 19007 Comm: syz-executor7 Not tainted 4.17.0+ #84 [ 720.226931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.236285] Call Trace: [ 720.238887] dump_stack+0x1b9/0x294 [ 720.242528] ? dump_stack_print_info.cold.2+0x52/0x52 [ 720.247903] ? perf_trace_lock_acquire+0xe3/0x980 [ 720.252759] ? kernel_text_address+0x79/0xf0 [ 720.257192] ? __unwind_start+0x166/0x330 [ 720.261367] should_fail.cold.4+0xa/0x1a [ 720.265543] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 720.270642] ? save_stack+0xa9/0xd0 [ 720.274253] ? save_stack+0x43/0xd0 [ 720.277875] ? kasan_slab_alloc+0x12/0x20 [ 720.282022] ? find_held_lock+0x36/0x1c0 [ 720.286095] ? check_same_owner+0x320/0x320 [ 720.290423] ? rcu_note_context_switch+0x710/0x710 [ 720.295346] __should_failslab+0x124/0x180 [ 720.299790] should_failslab+0x9/0x14 [ 720.303653] kmem_cache_alloc_node_trace+0x26f/0x770 [ 720.308767] __kmalloc_node_track_caller+0x33/0x70 [ 720.313696] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 720.318474] __alloc_skb+0x14d/0x780 [ 720.322187] ? skb_scrub_packet+0x580/0x580 [ 720.326692] pfkey_sendmsg+0x684/0x1050 [ 720.330674] ? _copy_from_user+0xdf/0x150 [ 720.334855] ? pfkey_spdget+0xb10/0xb10 [ 720.338834] ? security_socket_sendmsg+0x94/0xc0 [ 720.343581] ? pfkey_spdget+0xb10/0xb10 [ 720.347547] sock_sendmsg+0xd5/0x120 [ 720.351264] ___sys_sendmsg+0x805/0x940 [ 720.355241] ? copy_msghdr_from_user+0x560/0x560 [ 720.359996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.365529] ? proc_fail_nth_write+0x96/0x1f0 [ 720.370027] ? __fget_light+0x2ef/0x430 [ 720.374003] ? fget_raw+0x20/0x20 [ 720.377449] ? find_held_lock+0x36/0x1c0 [ 720.381500] ? kasan_check_write+0x14/0x20 [ 720.385726] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 720.390640] ? wait_for_completion+0x870/0x870 [ 720.395211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 720.400736] ? sockfd_lookup_light+0xc5/0x160 [ 720.405567] __sys_sendmsg+0x115/0x270 [ 720.409439] ? __ia32_sys_shutdown+0x80/0x80 [ 720.413834] ? __sb_end_write+0xac/0xe0 [ 720.417806] ? fput+0x130/0x1a0 [ 720.421082] ? ksys_write+0x1a6/0x250 [ 720.424873] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 720.429705] __x64_sys_sendmsg+0x78/0xb0 [ 720.433751] do_syscall_64+0x1b1/0x800 [ 720.437631] ? finish_task_switch+0x1ca/0x840 [ 720.442129] ? syscall_return_slowpath+0x5c0/0x5c0 [ 720.447045] ? syscall_return_slowpath+0x30f/0x5c0 [ 720.451978] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 720.457358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 720.462193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.467379] RIP: 0033:0x455a09 [ 720.470571] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.490341] RSP: 002b:00007f9bd615dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 720.498058] RAX: ffffffffffffffda RBX: 00007f9bd615e6d4 RCX: 0000000000455a09 2018/06/05 09:47:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000020030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='.//ontrol\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xfa03]}, 0x10) 2018/06/05 09:47:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 6: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 7 (fault-call:1 fault-nth:5): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) eventfd2(0x80, 0x80000) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 720.505319] RDX: 0000000000000000 RSI: 0000000020f56000 RDI: 0000000000000013 [ 720.512578] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 720.519842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 720.527114] R13: 00000000000005c9 R14: 00000000006fdb78 R15: 0000000000000004 2018/06/05 09:47:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000200030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 720.608228] BTRFS error (device loop6): superblock checksum mismatch 2018/06/05 09:47:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./.ontrol\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:42 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 720.725279] BTRFS error (device loop6): open_ctree failed 2018/06/05 09:47:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x1c01]}, 0x10) 2018/06/05 09:47:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000004030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000001580)=ANY=[@ANYPTR64, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES64, @ANYRES32], @ANYRES32, @ANYPTR64=&(0x7f0000001600)=ANY=[@ANYRES32, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR64, @ANYPTR64], @ANYPTR64=&(0x7f0000001780)=ANY=[@ANYBLOB="901aea0156f136b67e2e069365b59f1e581cca4036bf15a237903b229683b28cb6c83ca3eeb366f1ea37ad9d3b50b68517d23d84672b422b60f70b2b3f0f28bacfe284a926dce2b719ec4c4bccc2a4033d421f7ff5e2bf477afe08f93db2", @ANYPTR, @ANYBLOB="9db5a513b47be31e631d80ea8eb91cc19718fa81f2fb476819560e96e45d2bcf80a2726c04d6af64f6d80b980b52fcea02a61808679d1413f7894b6d10723d15391f270095f4917e04d5fb59f5379723d739e787c43c793c5b8f36d2ec81d1ccf5f73072af95f32f805c00ec1206ebcb5675e1d9f24a1fb4bcd5763479663fc57b993b3946652c810f9183e9323df7648e63c8e7c67b5ae6bfbce58c6802b4baee0ec35572bd53431c0e2f564925eaeb1e50fa025e075eb2dfa03684d391700b8a9815d9d5f05323e732ea24b9217329d329efe879b3d8a01522d9b6ece80cf0eb0410d2d6b5c10c26312e530077a0e10281c65716a7c57e1eee67338be8caf4e552d0c6ef5a195453796da4c1825826134d781f83a3155f40d2adc4e7159045c4d727b4573dd999accf84c0b4df6074abbecc819072730c27c298a1cde447b466f240329968e52b4cbf00c23e7a60d292e0f440fa4de7777adc97324b10ec4778a4e550f8ff878d882ba6503bdad558723c6599897e9abb48c92d135d193d310b24e0f19d0082570dc61812ae3759d2ee058b65003bd765169e142d16a3639be8634794845bcd2447d8ae4a0ef47349408b2a16995bb614197c59c2e8716e96da37da4aad9fda3b31a1c0465839a379a0697c234a8d7abf1373484184d3590a55347bc2c968395c669785b165131896bff14adae2f3bea867c1210644aa755d21662b0e0df006569909f0be24c19f4823ece6367b8f7871701eb9a464d62590b74e6f0ea2362fcb277d759c774d067b7d727563040dc3f16be954ececf60bc16cb7ea0c91b82d43efab6bbe7daf9c61a1b33e0cf53d6b236e6c3ff5a5fdc2dad09ada32f260db5e3c52794cd85fc5682b970802d1e28d40aa49c2bf4bbccdd1a0db56bca72062f8e61849d085c91d14e0701ab9fc350cd453f8c8be2ab69ef7e601fd15b06d4c4aa22cd733541738582c66671c8fde5105bc6bafe83195c1684171fedaac8c8a36711a686cc9d33dc40bbc10cd95cd549711a8d63aad97fe1e13dca3c389760e8a50975d7b7f7c37e86d1d1b413e244ff9184c24edb41acd06a58246bd983636dab796176b2c2f9693ad1c6989156ba2e5f6d08ec44f94cd29e038c6bc27cfb260a35b4272c5d800f9b9a737e9c27bd644ee01346284833ef27f8d444b19c61ae923993c54638cd80e43320e01b356374c3257def7a748a481b4717a2d660e91bf9cdc110077fd24d52848ba5ed507bf1c31ea16606269a48a3f534b5f3fab7b39102e0a779fac31798f6d5ce62e1a2d89bb7fba17b4cd7e840720a2b321e261599454ba07398b8930d7da41f86298e5c727395f2344415fb0fd11b65f1b166bd93063bbebc207ee34a5a60a87584647d3009f2dc585070548e8ecadaece1725615e29ba85710669ec249e41a3ff61db252864c4731ee3171f4bb4b1a09d0b4996d1c79632e227640d92cf99e0184e4b5056115900dd9ac670ca88661629f0a7d487b717e7fef30d6d935d5c104aa18ec6d4ec9cc7461ee2552d356a0151fbd83ddc73b399769c1afde3ca67263fd76e82ab459f81ffd9eafa756e411bf1b9acd055231503b94690c76d9ba8f5bcdf8002de568076d79d8ddc2498575d9404d3e799a7878eae69e521fcb4b6506d039ce722641bf66eaa6d9e307979ed9e5c5d1c35273e38c6512e1f37452d98f18d05d0c6d3496004fb665acbb20c34583df72219a08637820aaa8a4705138842a9571623f32207a890d88e10fb62b1a8bb3f2eec4a6fb38fa21be5b803a5a9e4daec795927e7e53c10fe50ee22b3f1114bab7d51ff98188b563b4386b2d1417eee11050181afc8c7a490a57f90a9456ca385bc6abf7d23d41a5ed22ddb55fce47d88b87c5df1c47efc11204a3620e586582bde5d32671c437e064f734977a825a1f5f089006067b443a3bf802a88005c76b12618c3b0cbb0956c9716def85786939fa3a0e4e76597867071003357cfc56f40245e21c8464ed79647835b8119d96a49c1e8cd090b12ed5b64af4000d01687edc0805fb97f8346b9b1d03e7a2d44d6a89073131ee5806bd2e391b27393a7834da2acd7d4c15e29d08ea38610e23c175a280c3001e861a50e72ff2f13c2a12694eadd93645333bee267452d6bc2b3da0967fb6ce291cbd545faaea66124800d2623065bb7c78c463381cd142e2070c541d62b301a158af612d2b7b122dd5aea0638553d12ed57eac84268bd6c72cfb5d8354c8918028cb477865b9885022ad96247beda8a231409dfe7e137e262cbe8e936bf8bda1f46627e534321a685ff5a9d510425e914b46e38c6b81f32438f1851368f190ba04ea7c6083772c38d65770637207df522482e68265ab7cbe558a5f403ce5c44a17053351510fbe80f64302dc37ded5cd315b1a725359b6780a82ceb3f2f16673fa78509980520e1b8586d402e1f12596be7f0a6fdeecd0000000000007e39a7307227852bf82d4dab5eec05f427fae3a4e610fff3cf93beb0518648919e94e3d156d0a505cc6023d96c217839e1745a81ed29f17a21edde2875af2d5e6833f4a8549116f9541775331cd6200c883864735381182c733de8a5e704754e3d69c55596ae00eb358bc51502a844e831ae3ac0bdcbe363d0ca4b14a446bf1b4b64846efe0183390ec91c1f73c938d758727deb6bf1e0cf53db3a31db3a9e2404d6666803c573394767e8fae71fbed0c7395f7744d46431c8b49697a7c44933137579d99fd0e6e5844b7c4ae269c63e3aef41cbfa9b32924778172b8d6b80a00cf49581750aa1312596031bc34bec6c6ab716c4b559ab225bb6eb924ec504560c1869e0ff879447e29beeae5e9b833374d6086c9fb34be34cc1739c83f5348850a914bc0f30d1e7c1d99fd09eacebf7d29f65fa594390266586dfa61f26d249785ca29e5795ba658e40d25e944792be10dbc79b2ba134c3d128d8d45cec65c393981aa18aadaa255c75268acc7cee53e2a2bcf81378164518a14d78ef0c103f551340069502c5920932efcc22cb69c577022b10b53282514e3cea8de5b49f6407738807e27ec3978076b8941ce273f46216c3bd52cb07dcf7b4dab8b0bf550a5adf3beb2cbb5abfca4db7c1710a0c070e9d998de37fb7c81c67ae4733cba085ca140f882d78ef75b4edfd16852bbc85c5f60849f0add05a5158d9923415827c867558656c7c62e3951f44510955fc25d3023ab10e67adeeffae814653539f528fb87879c0d4c85cde34d0d8ccb0b8b176ac7c296db7550783295947fd89ec1b0e39df0c7f62dc9646463e37135f54f25bd2c7898ffd936deea518fe70c78811f7b80b39c2b0cc2cf01fd437c062e18cbe763c01b18aa179b91b267711140d8de8c57313c8b97ee3a53b7aba9a6846f1b4af942d30877de77fe75b647c4f29d2f96baa80a2cb2cd668c370066405c0279c6ce6db89fbaa37d5691ba0999231b15d276b596c53b63d67bcc9dd60f4a887b994a0f9b6101e2b8a15615b073026576b920c988e67b8c692398621116ba3f8f747007a790d484250ee1fd950244fc05b2b5e0b0e64e717c23953c0b2f3e549b5e5ec9c39d0ae2a982bb7ec1552880f9b4ddbda82f54c323a7bf863b01991d941d1837215f2670fd4f65f5e434d51c5a50b2ef2330fe87b9d87451d93e9f556d225fd94662b85384d31d88dfc18b6610bc5b3c71023457508dd54769af3fafce70025aaec0e9419ee64bb582cf4eb3135d2334b318372625358ecc424fc0ce02d4dbfcd5659dfe36985e299e06cb1be4d564eebc3ebed0b275246f0ac0f0d39adc006d521d68ffeff4197cdf2c9c854c0b60e7088332007acfbf4e71c87e5135319207fd28399cfdeb535b8e97133fd9af99b35fc7ca2285e79e2832771f59d5997a3c1ca10b806027cc66cd6b0d0ab6b7f4fe2f83da5c9b809823bbcc418b2d71ee9b1d61540decc9cf2038008fe3f28f0d01958948f78784fec28f7215997ad35dabf5a39be699ae9c32b2f509f5bed5159b0eb04671bfdd10ce589ffd216bbad551f9f046a39d47619793215657ccb2b8a6911c80e1b579183e1e2f93d89634576c22fbe1244248923a7c93a458ab55f7ae57fb46a734dbf3c8809e5a661deb2fba102878af58baca0e94e11171b190c593f3033f02529a8bcf6f9345f0d9015e0dde95658dbb13f50b6b7342005f2b9f9c986ee03801dd4795898595686cafcb7bffb2aadda23d27305fc2a15cdd9c72de93950663f0a586fcf212f63e8ad2f27ccbd79642110badd5ed25043ee090417458df7e720ca73822a7196d86c18515bd9dda3747a33d4a91bceee7575da437856048d52a89b957952f8288fb7d4c8ea872976bf198edaabf4581d79c52abacd692612ff50a2210bd497d24996a3eecbd3be3446b80a1cab5d0ad9c02d421ab96483861c2c732736cc6d175e1b61b8c8c43abff3a6460e7e98336b09d8d73f20f8b77cf14dc01cedd3c15b13865b38d28fd8e7c43e69ad1d7fd65aab4b6d0da42fb1eb03277dd0c934d34467ea4017a0c06ab56b3d570135b90eaf966ad243ddf1012fcc61b805b6ebaab23108061764e6d71b08f2e4d92da64c1b068c58fe48e9436d8c00330f969802090a421b999484431934d0c4edf24f3cd2eeb03efb1beab7aa858b7356aa8a6de08af1af10d9391c1cf5e762624075f439eb982226c2e40cfeab217527bbc6a3b401c98ffbc34bda9e5c305dd14e63c42c262ab170fee603cb9e1e93715dd2664ebbd25ccd7c987adf1902cc698de184677eb516f2d0c41063fdffc28c586721228b984c2ccb9079c464e8c8652bb6d46b57870c31d12058c9386cf5333775ba8d03b70db1fe7a3275e58c3683481c2460b701d7b5e9be934003c1107693a67fa87066f9c22c43341b25d79e964afb4a39c03216cb81b28879d1c3cedae218b24c39f9b049050cb01473f1ebdcad8025ef3de66780fce49b418f56b12161368bf37ce53e54a04b70ce6218add3f9e4a91a24244e74d8c4b7333e5d7881e3eb849be07ec61fd90541108637cbc40d62bf8ee57caba9d96027209d12bbdbba6f4a4ac0b695dae6bd0ebad8cef3e92db8f1b981db90bce4fd9c40dd6789cda16f922714d45ad83dbb6067edaed871cf3022aa3dc5d77313098f6100e4754f94fe785dd4960672ccae6885dd30d36ca82655979865dcc482d01ecc6c007d42b824df64232c50f6b9fb9618e3c646a0288f9334532d71db1b258d32c588ad4257e0ef6df75aefa388a7f2daf90dddbcd39d7f40d6b380b226afca504898ffd462b713a95421ebde8fbb727c1f17d24d731684bc251038d042bd89a261340ed9b06fdb3976991f3a0fd5cb6080f803cea13790363eeaf2e384513673f6dfe97708cc281005643cef35427a2270965fae3af19b1a05b3c2a411db340e723e3c81b0b715f096eb930f8fb07b301281ebe881078a50d619b4ddc32a2a9bbb0bde8a8130c2fcfb9d7425402816d011a2547b1cdd4280d853d075c3f566e5f3610583fb3d11ac9cecd5b0ac302684496246b6c4883863f5f6bdc956d8ac13a653588f334cda576028609f0f5c6e7afdcad2cba57c50058ed49c4edcbcc735377637a4728edd4f07affaed739604a63592f13a23dc486e220e4dc068980befd9bb9a3524f4c00bd823df4b42a0742f3910fe2b8b37236a306053bdfee885aae8154b09c22ea4877333c2374b75336e2e98b756f6d4d0933a4e4e08f8a315ce21916e977520e0019d37ad1f27b86d5b4a947634735206e9431b2fbda2bdbb4be53f7142c7ed3ed514b5db6bab0182f733a070291b33cf34c97fcb38dfa9d2290176a569a6afd28274617fdd8be816feec805465d63bea5a6fbcda57ca76357236f50039db94692d74432042c6f375f4100ff12cbc5eecf9a7fdbe23f1aec14f13fdd31d97a984d1b4b8a892e993642da029704a6b39ff31207b8ead057220086466b0e1709f4820aa14bbf182e4d2523aaa81806b7b1bdc054bb0000c5ccfff", @ANYPTR64], @ANYBLOB="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"], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES64, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR, @ANYRES32]]]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) openat$autofs(0xffffffffffffff9c, &(0x7f0000001740)='/dev/autofs\x00', 0x3f092136d793276d, 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7, 0x4000) set_robust_list(&(0x7f00000001c0)={0x0, 0x7ff, &(0x7f0000000180)={&(0x7f00000003c0)}}, 0x18) 2018/06/05 09:47:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 720.970365] FAT-fs (loop3): bogus number of reserved sectors [ 720.976372] FAT-fs (loop3): Can't find a valid FAT filesystem [ 721.013590] BTRFS error (device loop6): superblock checksum mismatch [ 721.053670] FAT-fs (loop3): bogus number of reserved sectors [ 721.059697] FAT-fs (loop3): Can't find a valid FAT filesystem [ 721.071467] BTRFS error (device loop6): open_ctree failed 2018/06/05 09:47:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)="2e2f636f6e74726f6c02", &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x2, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x10) 2018/06/05 09:47:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000002030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0xaaaaaaaaaaaadb0, &(0x7f0000000040), 0x280002, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000140)='./file0/*ile1\x00') r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x454, 0x258200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000200)={0x0, 0x0, 0xdcf}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000240)={r1, r2}) 2018/06/05 09:47:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)="2e2f636f6e74726f6c8c", &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xfa03000000000000]}, 0x10) 2018/06/05 09:47:42 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x2000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000020005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)="2e2f636f6e74726f6cf6", &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x2000000000000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r0, r1) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='io.stat\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000440)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x17, 0x10, &(0x7f00000003c0)="b01c9e896aac53b455fdc51d65ff5a73"}) rename(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10000, 0x0) 2018/06/05 09:47:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030205000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf0000000]}, 0x10) 2018/06/05 09:47:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x40030000000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x44]}, 0x10) 2018/06/05 09:47:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030405000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x200000000000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7fff, 0x8000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x4a0, 0x0, 0x2f8, 0xffffffff, 0x2f8, 0x100, 0x408, 0x408, 0xffffffff, 0x408, 0x408, 0x5, &(0x7f0000000180), {[{{@uncond, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x8, 0x200, 0x0, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x1c, @dev={0xac, 0x14, 0x14, 0x1d}, @loopback=0x7f000001, @gre_key=0x3, @port=0x4e23}}}}, {{@ip={@local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, 0xffffffff, 0x0, 'eql\x00', 'bond0\x00', {}, {0xff}, 0x33, 0x2}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x100, [0x5, 0x3, 0x0, 0xff2a, 0xff, 0xd900], 0x7fffffff, 0x41f1, 0x1}}}, @common=@inet=@set1={0x28, 'set\x00', 0x1, {{0xda, 0x8, 0xea4}}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @empty, @remote={0xac, 0x14, 0x14, 0xbb}, @icmp_id=0x68, @port=0x4e23}}}}, {{@ip={@rand_addr=0xeb, @broadcast=0xffffffff, 0xffffff00, 0x0, 'bond_slave_1\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x5e, 0x3, 0x4}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001, @gre_key=0x101, @icmp_id=0x65}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x500) 2018/06/05 09:47:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003001a000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf303000000000000]}, 0x10) 2018/06/05 09:47:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)="2e2f636f6e74726f6cff", &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030018000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x4000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)="2e2f636f6e74726f6cff", &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000001c0)=0x3) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000200)={0x101, 0xfffffffffffffffa, 0x0, 0xc0, 0x7, 0x2}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000100)=0xfffffffffffffe7d) ioctl$void(r1, 0xc0045c77) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x10) 2018/06/05 09:47:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030018000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x400300, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x4400]}, 0x10) 2018/06/05 09:47:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000180)='./file0/file0\x00', 0x110, 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x840, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000600)=0x4) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/166) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0/*ile1\x00', &(0x7f00000005c0)='./file0/file0/file0\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0xb, 0x3}, {0xf, 0x7f}, {0x8, 0x734}, {0xf, 0x4}], 0x4) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r2 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000200)={'team0\x00', {0x2, 0x4e20, @multicast1=0xe0000001}}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) sendmsg$nl_generic(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x74, 0x22, 0x100, 0x70bd27, 0x25dfdbff, {0x6}, [@generic="404a07bb8465eb255be2e49f02b347fbce60d84f1bcc9a21cf3bff306ef1985ec6917c2b969ff534a5e97deed026d989aadbebab98340db42ba5a2445e31942a546e71e8707fc0ded5801dad1c350b8d752909290e5873a6a24c27a3a3"]}, 0x74}, 0x1}, 0x4008880) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x10000000009}, 0xffffffffffffff9d) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 722.552370] BTRFS error (device loop1): superblock checksum mismatch [ 722.575549] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x4, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003001a000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x11]}, 0x10) [ 722.790074] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:47:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1c000000, 0x8000) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000180)=0x1) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 722.849776] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x20000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200000, 0x0) syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0xc35, 0x1) accept$nfc_llcp(r0, &(0x7f00000001c0), &(0x7f0000000240)=0x60) r1 = semget$private(0x0, 0x7, 0x20) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)=[0x8001, 0xffffffff, 0x80, 0x9f]) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005004003000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf103000000000000]}, 0x10) 2018/06/05 09:47:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0xffffff7f, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000340000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xf8000000]}, 0x10) [ 723.262643] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:47:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x34000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 723.340471] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:47:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000020002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0xec03]}, 0x10) 2018/06/05 09:47:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x20200, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000007c0)={0x7f}, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="3a58fe89c5ff982de6753f7e4de909ebbe1e81d3c4a81dfe5d58b70440c70d4fdb035fbf9636e79c0c", 0x29}, {&(0x7f0000000380)="b9e8a758639da4fce2442a37d0dae3d5abbf52964a44a5236705ddd019d888de5471911e5ef60293adf879b4a17792ef0fa6d17b51808a985a6f2e418fbc4ca470f9a2b4e54fc44398d6e13a8577336f60dae0aed1d341b0b16e81da385f25f84156cc83373d68be27fdf5fc1aefe724510f6aadf7310c582560382dcba38fcc5e5db1ae06ff49cc52332548e6648f18daed9c0fc28238dcb5c91d428cf0339d2f82bb9956e0c9c1d16080a3c115352af58ccc696c3a0e61528036ee3f1a7790fe5ab6d74edcdd8602e990d6b76b38cf4d11214d14cc7b64", 0xd8}, {&(0x7f0000000500)="a0e544ae776f5f587b90f4c2981f8f05f09637221a1a28fc3cb930c548c85dbf6f41520c12845ca685263ee30558cd307ea7675dea3658d796c38d6e2b1a25eb6d388f44808522d262f69b01c6ffb5d4ff86ce19cb0d9a6ae9a0cb196a998ab962560eefaebfe06c9a37b8e363c50bb6d7e06f07624d238849781ea17c9e52e86cf1c6a20198b8cd18998663dce5895a2362c5694bec559d0ccbb16e35a776047f7dd627f27d03d21a51c5dcdee2177b33048a594809ec2498b2fc0a1efa5a7de3483a68397118d4fe8b7ce5698db57af98ce44f0f10f3094690dfc4730dc85323ed61fddd8c906c653be9030994c88c451c5f1fa82a", 0xf6}, {&(0x7f0000000240)="3e663d58672374f3ae03167eae2e41", 0xf}, {&(0x7f0000000600)="115637cf787afe4b3704623fe61c387b7bdd3d1930a7ec572aa29729988547943afd97d2af63e2f818e43c5abf1ef2d36aa6849be72c2082febadbc818b7a3381a4323c9486aef63818f3068d9d044d48c31f4ff50c4b56d2c6d44584a5a8374d45fea9b3e5d32d760b467a6b300a879e912bb43225b429e74ecd0df1c35cbe1ac16c39e5ee37d1f3ccbaa78ac570b6463de2b8644eb662b3d", 0x99}], 0x5) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000780)='/dev/rfkill\x00', 0x880, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000006c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000700)=""/82, 0x52) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x100000000000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='//file0\x00') 2018/06/05 09:47:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000200002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x400000000000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./.ile0\x00') 2018/06/05 09:47:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005002000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f4]}, 0x10) 2018/06/05 09:47:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0xffffff7f00000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='.//ile0\x00') 2018/06/05 09:47:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000040002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x9, 0x440) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x218, 0xffffffff, 0xffffffff, 0x218, 0xffffffff, 0x3, &(0x7f0000000180), {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0xd3d8, 0x9, [0x35, 0x11, 0x32, 0x2a, 0x14, 0x6, 0x3e, 0x33, 0xf, 0x12, 0x2e, 0x35, 0x18, 0x26, 0x10, 0x1c], 0x1, 0xbf, 0xd4cf}}}, {{@ip={@multicast1=0xe0000001, @multicast1=0xe0000001, 0xffffff00, 0xff, 'veth1_to_bridge\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x0, 0x2, 0x2}, 0x0, 0xd8, 0xf8, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xea3b, [0x19a, 0x0, 0x3ff, 0x0, 0x0, 0x3], 0x7ff80000000, 0x3f, 0x8}}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x310) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}, 0x10) 2018/06/05 09:47:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x1000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x10) 2018/06/05 09:47:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x2000000, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005fffffffb0002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000003940)=[{{&(0x7f00000001c0)=@rc, 0x80, &(0x7f0000000680)=[{&(0x7f0000000240)}, {&(0x7f00000002c0)=""/25, 0x19}, {&(0x7f0000000380)=""/237, 0xed}, {&(0x7f0000000500)=""/195, 0xc3}, {&(0x7f0000000600)=""/70, 0x46}], 0x5, 0x0, 0x0, 0x7}, 0x2}, {{&(0x7f0000000700)=@l2, 0x80, &(0x7f0000000300)=[{&(0x7f0000000780)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x6}, 0x1ff0000000000}, {{&(0x7f0000000840)=@un=@abs, 0x80, &(0x7f0000000940)=[{&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000008c0)=""/86, 0x56}], 0x2, &(0x7f0000000980)=""/247, 0xf7, 0x1f}, 0x1}, {{&(0x7f0000000a80)=@hci, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000b00)=""/49, 0x31}], 0x1, &(0x7f0000000b80)=""/164, 0xa4, 0x3ff}, 0x1}, {{&(0x7f0000000c40)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000000cc0)=""/37, 0x25}, {&(0x7f0000000d00)=""/224, 0xe0}, {&(0x7f0000000e00)=""/71, 0x47}, {&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/244, 0xf4}, {&(0x7f0000001f80)=""/241, 0xf1}, {&(0x7f0000002080)=""/23, 0x17}], 0x7, 0x0, 0x0, 0x200}, 0xffffffff9c521c56}, {{&(0x7f0000002140)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000002300)=[{&(0x7f00000021c0)=""/232, 0xe8}, {&(0x7f00000022c0)=""/31, 0x1f}], 0x2, 0x0, 0x0, 0x1000}, 0x8}, {{&(0x7f0000002340)=@ethernet, 0x80, &(0x7f0000003880)=[{&(0x7f00000023c0)=""/189, 0xbd}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/192, 0xc0}, {&(0x7f0000003540)=""/248, 0xf8}, {&(0x7f0000003640)=""/132, 0x84}, {&(0x7f0000003700)=""/93, 0x5d}, {&(0x7f0000003780)=""/203, 0xcb}], 0x7, &(0x7f0000003900)=""/52, 0x34, 0x9}, 0x2}], 0x7, 0x100, &(0x7f0000003b00)={0x0, 0x1c9c380}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000003b40)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x40) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000180)={0x100000001}) 2018/06/05 09:47:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005020000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x100000000000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}, 0x10) 2018/06/05 09:47:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005040000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x200000000000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ppp\x00', 0x4000, 0x0) mknodat(r0, &(0x7f0000000dc0)='./file0/*ile1\x00', 0x10, 0xb9e) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0/*ile1\x00', 0xe000, 0x8, &(0x7f0000000d00)=[{&(0x7f00000008c0)="5cc53829739b8a46a4e83578e342be47f07cd88765081dcddec7b21c6fbe93c012cbda876a1feb12f8bcc998f72b2cd7cd49f2d9a145473374092143174af7b1fe8a44cd7a3ed0f32a3e3939d01323924fe1", 0x52, 0x3ff}, {&(0x7f0000000940)="84d30d24a9af8d91a61c1ba88c64f0d07eaa288050f00854b53bc1d71cc2dc86ea6c1a3a3cd5a7e22f13c47c36c92b35c94c375aba6becbaace5fbf908a788de39397604fc60411fe67419fc1e0351e7fdc9800e8fb9ec4d42476005a248931a13b370c8", 0x64}, {&(0x7f00000009c0)="33f16f43c3bb0cb30ac22c6e07f9f39910850ed8498a2fa3e07c670fc34024dc80af2d75377be0b058d596a2ee7cbeb8301d538a4655e843740e099e1169f20deaad54d28935f1234d2a89a7963b358865c7c90158938bcd2b31048103b9e8f2f4f2aa864360cf84bbe03c2c245561611ae3878efd6d6b61d1c0a2d7e31ca495280cd2efa40660cce0092c85bc6dd907343749a655a4b2ea5307b083dabfceb5fe04e5b1bd4471880d7a892c6605c577f3932d135c5a4731c816ab23cea9ff4ecf683d2d38c01e13c676b551c6ba78c908e48d25cf", 0xd5, 0x4}, {&(0x7f0000000ac0)="5b5d4e7eff78dcc675eaa4efcd06b62c7efb2f4d4a2ec3199741e758ca628a795b4693102dbcde3b50bdba2982a48c87cc177564b193d2f5cb12ed9fe717ffaab27b57ae9d85565e6cbb0a2cd0f54711edd8c38f78005ca8d106f24e39ff6c591e862602a55d81ecbc615e869ade3b3d827364f6d64eafbb51e5ef711cefc7e678a5350ad42becafdb281e31b03e286d9e6f17fba95b6fa12455", 0x9a, 0x1}, {&(0x7f0000000b80)="b6ecb26441baa5fec93c383d4a7cd1869f60aca23ad929065ca35479a81e3dce65af2f08634dd8207f1e38e770324383880b40c8ec83dccc98cd2d0305481f4563b3d125b08aec50f6ac5485740996609dfc70ee468143725e71500b15c4c501f91e41f849bd3323c65e9f38aa5889", 0x6f, 0xfffffffffffffffc}, {&(0x7f0000000480)="f5414a49f8c8997c9347d29b16d7daaf1f9397426a", 0x15, 0xbd25}, {&(0x7f0000000c00)="f0986526bcd7f466584c6eb6dfdbf29b7bbe08be1849475a5304b957987650b6440e3497a5320f29303766f8", 0x2c, 0x1}, {&(0x7f0000000c40)="9b8601def3ecb99c65e62ca5eef19bff6fd227b45d1858cffec03a2ac7bdf37e0cf1a27bde1b35ed7298ce1b5a3ac5f86658c2122ca63731de93f47c5988e4d89f35576a84d23a5e32ab6b955e0d2f441e257cb1598570980853b98de82dfb8f929478c6d2a8e565a1e5b86d2b17da7813aa0612a236c48742f333bdde2d630ff89cb1bfe5844b69b815333f94127b4d6417b65734ab6e43baa005175254321665d11cec1e", 0xa5, 0x9}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000800)=[{&(0x7f00000001c0)="b2042c36fa1969bf848df3f23b384d004da5e5fa8f60ad96c36b85761f45e30c47269ea08da068fd19cd1527b34ea23dccf91e7ed5983b7999c3626b130add5693d37f235805538ce30cc621c6fd96433679dc4647359186b1ac2f18b33220a0debe5036f94806d2fc281042968caf1997cc79cd911a68c9528956034b7fb1574cb41b96fc08f44aa53d2b66e29d30984ba224b58d25176978339dcfc31abaafaf70a07438d5a4aa49ac936fea03e2", 0xaf, 0xff}, {&(0x7f0000000380)="2793d36ffb445920eb189dcb2d1560f69879739ab2dbc2c5e0990c326179417b8492311fbdd0b7763da907567152432e7553de93b6e93e87024670fcbccada3ddc8fe86dae63ea65a2c739e81d0358f58d35996f0846240d78223d43193aea13084abeb259c0035e4eb799841e4668d456bec8afee7e161e102c90e1ee250e209f", 0x81, 0x8001}, {&(0x7f0000000500)="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", 0xff, 0x1ff}, {&(0x7f00000002c0)="dc8dd99d27e8042da4de42fea5349307618f22cd17fa2c0cb05a32327e2f5ccb501e35ea39158c2b9dc6b2bda341727eb9ae81dffcccd8462caf98ba526c4d9de06468e3e817fdf44529faffe895c042b6adb500766b508fce858337be2651", 0x5f, 0x5}, {&(0x7f0000000600)="657445b87250632395b26bed9e8f763f36b6ea036f2dd5df25e20c12fe9064e600b9f3598bd7dadf3f60b333bf2b6864cd96c1a6b459f5ccc88753f5254af7b07792c5c3cc846a80c9994e656e96c5f0692fd59088c6c45feea954fd9c9861dc94435bbfefb751ee50fbcfaf2d0b0424ef53bc609e38bdbf7cce1c61eec944499ab1fd109f5562037782a60d2e7fb5bef94dce975ff44b0af6fb41e66b51617808dd4257f61186a636c93eeec4fa8801114da6f4ddc65f02fe2a213cfaff2b133b08a42fee9e4b6c694364160fd18eab3c73dbe2374ad1030b15c93d825d705e13eae872bd9187e0608cecd4dca77badb2", 0xf1, 0xfffffffffffff001}, {&(0x7f0000000700)="fbf8749640a3d269a594ca0a992acaf3e2c59f7a9ae51cb596127b8631290b8cf567567b166a781a40e31d34f9ba80ed7a5fce3358c09e7ae8d0da9fd55fa85c4a06c8228cdb9d0848c5ba1a7af3c38cf74b7a51b2d5b1f98c3ae0a9e48b65058baec3f99a5c398ee0b32f6ea3a198047fd41fec0c6ab65601b9cb3ddc48d93031a415465ae98f4953fabf6ef850c8cdb63cf3bca3a77611db5dc592fae3e864bd9e035cce2ae4db64f4e7860d50b4a9eb46d85de2c1a1a152679585c9004e5323dbf8a490bbd2594e148488e33785e6a550ce69d61730b29bc72f79d4528de340c40efd12653b2bcc79bbeefd9ecf9ea287e81227c6", 0xf6, 0x3}], 0x4004, &(0x7f0000000440)='vfat\x00') 2018/06/05 09:47:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 724.851602] NFS: bad mount option value specified: vfat 2018/06/05 09:47:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005fbffffff0002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x10) 2018/06/05 09:47:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x4000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x35, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff00000002000000000300057fffffff0002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)="2e2f66696c6530ff") 2018/06/05 09:47:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x2000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x10) 2018/06/05 09:47:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000010002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:46 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x1000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:47 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500fbffffff02004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) prctl$getname(0x10, &(0x7f0000000380)=""/164) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) bind$netrom(r0, &(0x7f00000001c0)=@full={{0x3, {"930a831f3c95ff"}, 0xc3}, [{"94ea848cf35164"}, {"ff2f7514e88329"}, {"9954cb40e5e570"}, {"cdfdbd89056cac"}, {"89ceb044203654"}, {"80039328b8593e"}, {"6e0cf4d8015aea"}, {"57d6def1c08434"}]}, 0x48) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x3}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x2000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x10) 2018/06/05 09:47:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 725.509926] FAULT_INJECTION: forcing a failure. [ 725.509926] name failslab, interval 1, probability 0, space 0, times 0 [ 725.521337] CPU: 0 PID: 19726 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 725.528279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.537646] Call Trace: [ 725.540255] dump_stack+0x1b9/0x294 [ 725.543912] ? dump_stack_print_info.cold.2+0x52/0x52 [ 725.549130] should_fail.cold.4+0xa/0x1a [ 725.553216] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 725.558342] ? lock_downgrade+0x8e0/0x8e0 [ 725.562516] ? proc_fail_nth_write+0x96/0x1f0 [ 725.567032] ? proc_cwd_link+0x1d0/0x1d0 [ 725.571116] ? find_held_lock+0x36/0x1c0 [ 725.575217] ? check_same_owner+0x320/0x320 [ 725.579561] ? rcu_note_context_switch+0x710/0x710 [ 725.584514] __should_failslab+0x124/0x180 [ 725.588769] should_failslab+0x9/0x14 [ 725.592590] __kmalloc+0x2c8/0x760 [ 725.596143] ? strncpy_from_user+0x500/0x500 [ 725.600565] ? fput+0x130/0x1a0 [ 725.603918] ? __x64_sys_memfd_create+0x139/0x5a0 [ 725.608789] __x64_sys_memfd_create+0x139/0x5a0 [ 725.613479] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 725.619126] ? memfd_fcntl+0x15d0/0x15d0 [ 725.623202] ? do_syscall_64+0x92/0x800 [ 725.627213] do_syscall_64+0x1b1/0x800 [ 725.631119] ? finish_task_switch+0x1ca/0x840 [ 725.635725] ? syscall_return_slowpath+0x5c0/0x5c0 [ 725.640673] ? syscall_return_slowpath+0x30f/0x5c0 [ 725.645632] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 725.651020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.655896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.661106] RIP: 0033:0x455a09 [ 725.664298] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.683736] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 725.691463] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 725.696157] QAT: Invalid ioctl [ 725.698739] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee 2018/06/05 09:47:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)="2e2f66696c653002") 2018/06/05 09:47:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x4, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 725.698749] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 725.698758] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 725.698767] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000000 [ 725.818433] QAT: Invalid ioctl 2018/06/05 09:47:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)="2e2f66696c65308c") 2018/06/05 09:47:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000040030002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3fa]}, 0x10) 2018/06/05 09:47:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x400000000000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 725.942619] FAULT_INJECTION: forcing a failure. [ 725.942619] name failslab, interval 1, probability 0, space 0, times 0 [ 725.953970] CPU: 1 PID: 19769 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 725.960913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.970280] Call Trace: [ 725.972897] dump_stack+0x1b9/0x294 [ 725.976549] ? dump_stack_print_info.cold.2+0x52/0x52 [ 725.981767] should_fail.cold.4+0xa/0x1a [ 725.985873] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 725.991010] ? find_held_lock+0x36/0x1c0 [ 725.995121] ? check_same_owner+0x320/0x320 [ 725.999572] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 726.004612] ? rcu_note_context_switch+0x710/0x710 [ 726.009739] __should_failslab+0x124/0x180 [ 726.013995] should_failslab+0x9/0x14 [ 726.018073] kmem_cache_alloc+0x2af/0x760 [ 726.022251] ? lock_downgrade+0x8e0/0x8e0 [ 726.026421] __d_alloc+0xc0/0xd30 [ 726.029935] ? do_raw_spin_unlock+0x9e/0x2e0 [ 726.034473] ? shrink_dcache_for_umount+0x290/0x290 [ 726.039506] ? __lock_is_held+0xb5/0x140 [ 726.043590] ? _raw_spin_unlock+0x22/0x30 [ 726.047783] ? __alloc_fd+0x346/0x700 [ 726.051607] ? exit_files+0xb0/0xb0 [ 726.055256] ? lock_downgrade+0x8e0/0x8e0 [ 726.059426] d_alloc_pseudo+0x1d/0x30 [ 726.063249] __shmem_file_setup+0x1ed/0x6e0 [ 726.067593] ? shmem_fill_super+0xa30/0xa30 [ 726.071934] ? get_unused_fd_flags+0x121/0x190 [ 726.076622] ? __alloc_fd+0x700/0x700 [ 726.080548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.086108] ? _copy_from_user+0xdf/0x150 [ 726.090281] __x64_sys_memfd_create+0x2a7/0x5a0 [ 726.095058] ? memfd_fcntl+0x15d0/0x15d0 [ 726.099757] ? do_syscall_64+0x92/0x800 [ 726.103766] do_syscall_64+0x1b1/0x800 [ 726.107682] ? finish_task_switch+0x1ca/0x840 [ 726.112217] ? syscall_return_slowpath+0x5c0/0x5c0 [ 726.117187] ? syscall_return_slowpath+0x30f/0x5c0 [ 726.122146] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 726.127545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.132422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.137650] RIP: 0033:0x455a09 [ 726.140850] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.160315] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 726.168082] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 726.175373] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 726.182664] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 2018/06/05 09:47:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x10) 2018/06/05 09:47:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)="2e2f66696c6530f6") 2018/06/05 09:47:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)="2e2f66696c6530ff") 2018/06/05 09:47:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x10) 2018/06/05 09:47:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000202004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x400300, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 726.189953] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 726.197242] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000001 2018/06/05 09:47:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)="2eb2d6b880190010069364814344289b83393b3b997a6e14596c1a3bd586bd387a824c12977cc23815b4abfefbd2e7aee2f162100d0833a1131b9b0adbc4e2edacb622ea66d2219383f9a9813b81c033cf7a6773299ce4744dc6f77e1e08234b91f9683b", 0x200002, 0x0) fchdir(r0) mknod(&(0x7f0000000040)='./file0/file0\x00', 0x8000, 0x7) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x34000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 726.421266] FAULT_INJECTION: forcing a failure. [ 726.421266] name failslab, interval 1, probability 0, space 0, times 0 [ 726.432618] CPU: 1 PID: 19828 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 726.439748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.449129] Call Trace: [ 726.451749] dump_stack+0x1b9/0x294 [ 726.455403] ? dump_stack_print_info.cold.2+0x52/0x52 [ 726.460623] ? perf_trace_lock_acquire+0xe3/0x980 [ 726.465497] ? __kernel_text_address+0xd/0x40 [ 726.470020] ? unwind_get_return_address+0x61/0xa0 [ 726.475629] should_fail.cold.4+0xa/0x1a [ 726.479723] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.484859] ? save_stack+0xa9/0xd0 [ 726.488512] ? save_stack+0x43/0xd0 [ 726.492158] ? kasan_kmalloc+0xc4/0xe0 [ 726.496074] ? kasan_slab_alloc+0x12/0x20 [ 726.500241] ? kmem_cache_alloc+0x12e/0x760 [ 726.504590] ? __d_alloc+0xc0/0xd30 [ 726.508245] ? d_alloc_pseudo+0x1d/0x30 [ 726.512243] ? __shmem_file_setup+0x1ed/0x6e0 [ 726.516771] ? do_syscall_64+0x1b1/0x800 [ 726.520879] ? find_held_lock+0x36/0x1c0 [ 726.524963] ? check_same_owner+0x320/0x320 [ 726.529284] ? rcu_note_context_switch+0x710/0x710 [ 726.534203] ? kasan_check_read+0x11/0x20 [ 726.538343] ? rcu_is_watching+0x85/0x140 [ 726.542485] __should_failslab+0x124/0x180 [ 726.546713] should_failslab+0x9/0x14 [ 726.550506] kmem_cache_alloc+0x2af/0x760 [ 726.554648] ? __raw_spin_lock_init+0x1c/0x100 [ 726.559224] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 726.564495] ? shmem_destroy_callback+0xc0/0xc0 [ 726.569164] shmem_alloc_inode+0x1b/0x40 [ 726.573217] alloc_inode+0x63/0x190 [ 726.576836] new_inode_pseudo+0x69/0x1a0 [ 726.580890] ? prune_icache_sb+0x1a0/0x1a0 [ 726.585207] ? shrink_dcache_for_umount+0x290/0x290 [ 726.590220] new_inode+0x1c/0x40 [ 726.593578] shmem_get_inode+0xe5/0x8f0 [ 726.597545] ? shmem_encode_fh+0x340/0x340 [ 726.601778] ? exit_files+0xb0/0xb0 [ 726.605401] ? lock_downgrade+0x8e0/0x8e0 [ 726.609555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.615093] ? d_set_d_op+0x31d/0x410 [ 726.618889] __shmem_file_setup+0x249/0x6e0 [ 726.623204] ? shmem_fill_super+0xa30/0xa30 [ 726.627519] ? get_unused_fd_flags+0x121/0x190 [ 726.632103] ? __alloc_fd+0x700/0x700 [ 726.635898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.641440] ? _copy_from_user+0xdf/0x150 [ 726.645588] __x64_sys_memfd_create+0x2a7/0x5a0 [ 726.650343] ? memfd_fcntl+0x15d0/0x15d0 [ 726.654405] ? do_syscall_64+0x92/0x800 [ 726.658482] do_syscall_64+0x1b1/0x800 [ 726.662370] ? finish_task_switch+0x1ca/0x840 [ 726.666855] ? syscall_return_slowpath+0x5c0/0x5c0 [ 726.671775] ? syscall_return_slowpath+0x30f/0x5c0 [ 726.676701] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 726.682062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.686901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.692078] RIP: 0033:0x455a09 [ 726.695254] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.714581] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 2018/06/05 09:47:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x10) 2018/06/05 09:47:48 executing program 0: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0xe, 0x80000) fchmod(r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(r1) r2 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x10100) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x44) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) inotify_init() ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000000c0)=0xa2) [ 726.722284] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 726.729542] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 726.736800] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 726.744233] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 726.751493] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000002 2018/06/05 09:47:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000003400002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:48 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x2, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0/file0\x00', 0xffffffff7fffffff, 0x8, &(0x7f0000000780)=[{&(0x7f0000000380)="56f9ed6f5a9605a185f8b15281bccf3591186a28645faef393742c93c0c8f45869737ffd1119b7bdd3de4577fea4c720048b1ec7dcd77e078c37eef1efaf7fde07bc766aa1622ea3cf42771d49680b178d083d78398bbfd555cd17042f7baa272f5179ff89ec0e052c2ceef49d0ccf479cde079aa20481e950fe2faeffac18af9cc44b36ffec8b057ca24fb3062cbe34e0662795d77b62a7504bb213bc58efc036f503b51c87461ca6f570cccc6343907a57a6b0d93fbbb14a3962ca591d73466506a33629f1c530228bd2207f9083c3a6932369c7141d1fd3595a595786eb7241b3c793baf5171058f1ed0d74", 0xed}, {&(0x7f00000001c0)="b5fa14d7fadc0253bbb799535222aaeac40c3ce9436be3a54be40e52f7dea5dd85aedf1a98a3b76424f394bdd30c9ee5438c11028c10dd52a54d40c22288b23da52b320b37f6fbce334f3664bf2c23de2e2bb01df1090bdd0ea1ca9c6eb3bf972268081c3a5302a9fa701841ed811949608765d3e58897da42816ad507b207caf6c840f61eb68a245d725ef575745dd43732488737d91a69ddbab5e40e1cf0327ff56fde60415f35ce1a1d4c867d9d5f6b86", 0xb2}, {&(0x7f00000002c0)="9cb5a5235ea440a48e1c31a133e9c13135d08b90aaccbb995d68fd0a05d2b7959a0358b6aa6a140327ae", 0x2a, 0x3}, {&(0x7f0000000500)="fa195274ebb359bd39cdc39fd7ec8311b0c47e823622d38793f771fa23e05d644bafb25137a23451c900c4a47a9f9c5c4052be7c50514cb227688b1d67461c4b32040599eca398883760a0e1b2defdfc9f34c8c85c11a92c11c3dec9b8965dcba9f98779df3fdf9f223807e991d8582ef8ee9a05541c08021f88dc8788d0824607fbf8c389dd0e569cc4ee01cd8cd5bf79300231ac15e579f8541ada00784860cf9bebde5405c32082b49b1e3b96b52eec7d77e9133d5034523fbe807628c9cae9bcc1715b78bd526022c4b2557e8ac741e6a7268afeb7291e40", 0xda, 0x1}, {&(0x7f0000000300)="d4c3e4f79c5e2d2cb293495d902786ce007d6c6998446fbf1b46b9fc3ab4d264ae4a9f1c02e169018f2d2af18542", 0x2e, 0x5}, {&(0x7f0000000600)="9b818bd41fe01d0f52eaa8db0171fb7485eb3e5bceaf9d676bf0acc0a7dc2909f8e87b730c7b4bfd0744f9bad087b7c51f877b3d78578b17ef88c6accef6ab98bc566baca65634fa3c0b3583e712767c90efcb9e44211bd0b7c50a2d8c3bacf55d66f2949a360f01c6932b14e59142ec28ff06cc0f5b711ff26b75ce2b164ef0a22fbb94047bdf87a485f1fab30eedd53d4bfa28060956a6eaddcaedad105e0d660643684cb4c0d3143765e87e22e23616371c7f60035db089", 0xb9, 0x5919}, {&(0x7f0000000480)="e0bb693fff0558278538592895a7a4", 0xf, 0x5}, {&(0x7f00000006c0)="3b756b53af3e99eca9a32924f5f28a67141a4ce4405f72e2ddf518a7f263cef0d5551db01e642ead39f213e8f7fe0b8a33e4780cf2b67b803639e0f65a06a7a9f105154590a6945918c68fcd78ff50d1502c21e290336cd4d6b381d9dc098550d0beda93bd293e622f348ba2ebc78d1a4e9b63c0c6216a964c1513a4796af60be6bf1de6486694ac9e64775f95b61b3fb0152956dc3e8de39791b8bb955eda8aa162f06c66a40d933e74b12e359b78d9660fb6a8d330af3b943ab8f2f4a55d91", 0xc0, 0x1ff}], 0x80000, &(0x7f0000000840)={[{@uid={'uid', 0x3d, [0x34, 0x32, 0x37]}, 0x2c}, {@tz_utc='tz=UTC', 0x2c}, {@debug='debug', 0x2c}]}) 2018/06/05 09:47:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80, 0x20000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7ff, 0x3ff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x8001, 0x1}, 0x8) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:48 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec030000]}, 0x10) [ 726.981137] FAULT_INJECTION: forcing a failure. [ 726.981137] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 726.993011] CPU: 0 PID: 19868 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 726.999943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.009303] Call Trace: [ 727.011898] dump_stack+0x1b9/0x294 [ 727.015530] ? dump_stack_print_info.cold.2+0x52/0x52 [ 727.020711] ? __lock_acquire+0x7f5/0x5140 [ 727.025119] should_fail.cold.4+0xa/0x1a [ 727.030144] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 727.035337] ? find_held_lock+0x36/0x1c0 [ 727.039389] ? graph_lock+0x170/0x170 [ 727.043179] ? lock_acquire+0x1dc/0x520 [ 727.047147] ? lock_downgrade+0x8e0/0x8e0 [ 727.051302] ? find_held_lock+0x36/0x1c0 [ 727.055371] __alloc_pages_nodemask+0x34e/0xd70 [ 727.060038] ? kasan_check_read+0x11/0x20 [ 727.064179] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 727.069194] ? rcu_read_unlock+0x35/0x70 [ 727.073256] ? memcg_kmem_get_cache+0x3f1/0x870 [ 727.077934] ? check_same_owner+0x320/0x320 [ 727.082268] cache_grow_begin+0x6e/0x6c0 [ 727.086328] kmem_cache_alloc+0x689/0x760 [ 727.090469] ? __raw_spin_lock_init+0x1c/0x100 [ 727.095151] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 727.100170] ? shmem_destroy_callback+0xc0/0xc0 [ 727.104926] shmem_alloc_inode+0x1b/0x40 [ 727.108979] alloc_inode+0x63/0x190 [ 727.112621] new_inode_pseudo+0x69/0x1a0 [ 727.116681] ? prune_icache_sb+0x1a0/0x1a0 [ 727.120910] ? shrink_dcache_for_umount+0x290/0x290 [ 727.125921] new_inode+0x1c/0x40 [ 727.129279] shmem_get_inode+0xe5/0x8f0 [ 727.133271] ? shmem_encode_fh+0x340/0x340 [ 727.137509] ? exit_files+0xb0/0xb0 [ 727.141132] ? lock_downgrade+0x8e0/0x8e0 [ 727.145279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.150979] ? d_set_d_op+0x31d/0x410 [ 727.154779] __shmem_file_setup+0x249/0x6e0 [ 727.159110] ? shmem_fill_super+0xa30/0xa30 [ 727.163423] ? get_unused_fd_flags+0x121/0x190 [ 727.167996] ? __alloc_fd+0x700/0x700 [ 727.171809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.177341] ? _copy_from_user+0xdf/0x150 [ 727.181489] __x64_sys_memfd_create+0x2a7/0x5a0 [ 727.186155] ? memfd_fcntl+0x15d0/0x15d0 [ 727.190214] ? do_syscall_64+0x92/0x800 [ 727.194196] do_syscall_64+0x1b1/0x800 [ 727.198075] ? finish_task_switch+0x1ca/0x840 [ 727.202562] ? syscall_return_slowpath+0x5c0/0x5c0 [ 727.207492] ? syscall_return_slowpath+0x30f/0x5c0 [ 727.212416] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 727.217774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.222637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.227817] RIP: 0033:0x455a09 [ 727.230990] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 727.250340] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 727.258045] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 727.265305] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 727.272576] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 2018/06/05 09:47:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 727.279842] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 727.287099] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000003 2018/06/05 09:47:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000020000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:48 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0xffffff7f00000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000]}, 0x10) 2018/06/05 09:47:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)="1f87aa55ff0729b9a31524b68d5066c22e2f", 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000100)={@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x1, 0x4, 0x2, {0xa, 0x4e24, 0x3f, @local={0xfe, 0x80, [], 0xaa}, 0x5}}}, {&(0x7f0000000400)=""/4096, 0x1000}, &(0x7f00000000c0), 0x4}, 0xa0) fchmod(r1, 0x27) 2018/06/05 09:47:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000200000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:49 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x20000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getreaper(0x9, &(0x7f0000000140)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x5) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:49 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000400000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:49 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0xffffff7f, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf800]}, 0x10) 2018/06/05 09:47:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigsuspend(&(0x7f00000001c0)={0xaa}, 0x8) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x280800, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000240)=0x400) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x2, 0x101000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000180)={0x5000, 0x100000}) [ 727.916571] FAULT_INJECTION: forcing a failure. [ 727.916571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 727.928978] CPU: 1 PID: 19957 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 727.935924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.945280] Call Trace: [ 727.947885] dump_stack+0x1b9/0x294 [ 727.951533] ? dump_stack_print_info.cold.2+0x52/0x52 [ 727.956745] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 727.961779] ? __radix_tree_lookup+0x3d4/0x6b0 [ 727.966394] should_fail.cold.4+0xa/0x1a [ 727.970497] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 727.975612] ? graph_lock+0x170/0x170 [ 727.979423] ? find_held_lock+0x36/0x1c0 [ 727.983489] ? __lock_is_held+0xb5/0x140 [ 727.987577] ? check_same_owner+0x320/0x320 [ 727.991892] ? graph_lock+0x170/0x170 [ 727.995687] ? rcu_note_context_switch+0x710/0x710 [ 728.000623] ? __might_sleep+0x95/0x190 [ 728.004601] __alloc_pages_nodemask+0x34e/0xd70 [ 728.009266] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 728.014276] ? debug_check_no_locks_freed+0x310/0x310 [ 728.019460] ? __update_load_avg_se.isra.34+0x61e/0x980 [ 728.024822] ? attach_entity_load_avg+0x850/0x850 [ 728.029659] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 728.034668] ? percpu_counter_add_batch+0xf2/0x150 [ 728.039626] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 728.045161] alloc_pages_vma+0xdd/0x540 [ 728.049136] shmem_alloc_page+0x178/0x2c0 [ 728.053287] ? shmem_swapin+0x3a0/0x3a0 [ 728.057257] ? find_lock_entry+0x2db/0x8a0 [ 728.061486] ? print_usage_bug+0xc0/0xc0 [ 728.065544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.071084] ? security_vm_enough_memory_mm+0x9d/0xc0 [ 728.076272] shmem_alloc_and_acct_page+0x1e9/0x800 [ 728.081197] ? shmem_alloc_hugepage+0x5e0/0x5e0 [ 728.085870] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 728.091054] shmem_getpage_gfp+0x6cf/0x4190 [ 728.095369] ? rcu_report_qs_rnp+0x790/0x790 [ 728.099780] ? print_usage_bug+0xc0/0xc0 [ 728.103834] ? shmem_mfill_atomic_pte+0x1c40/0x1c40 [ 728.108839] ? __lock_acquire+0x7f5/0x5140 [ 728.113064] ? print_usage_bug+0xc0/0xc0 [ 728.117122] ? __lock_acquire+0x7f5/0x5140 [ 728.121365] ? update_load_avg+0x2570/0x2570 [ 728.125768] ? print_usage_bug+0xc0/0xc0 [ 728.129836] ? print_usage_bug+0xc0/0xc0 [ 728.133895] ? __lock_acquire+0x7f5/0x5140 [ 728.138212] ? check_noncircular+0x20/0x20 [ 728.142464] ? __lock_acquire+0x7f5/0x5140 [ 728.146689] ? debug_check_no_locks_freed+0x310/0x310 [ 728.151875] ? __lock_acquire+0x7f5/0x5140 [ 728.156105] ? print_usage_bug+0xc0/0xc0 [ 728.160168] ? debug_check_no_locks_freed+0x310/0x310 [ 728.165355] ? print_usage_bug+0xc0/0xc0 [ 728.169418] ? print_usage_bug+0xc0/0xc0 [ 728.173473] ? print_usage_bug+0xc0/0xc0 [ 728.177528] ? print_usage_bug+0xc0/0xc0 [ 728.181580] ? graph_lock+0x170/0x170 [ 728.185372] ? print_usage_bug+0xc0/0xc0 [ 728.189436] ? __lock_acquire+0x7f5/0x5140 [ 728.193675] ? __lock_acquire+0x7f5/0x5140 [ 728.198331] ? graph_lock+0x170/0x170 [ 728.202128] ? graph_lock+0x170/0x170 [ 728.205925] ? find_held_lock+0x36/0x1c0 [ 728.209980] ? print_usage_bug+0xc0/0xc0 [ 728.214047] ? lock_downgrade+0x8e0/0x8e0 [ 728.218202] ? lock_release+0xa10/0xa10 [ 728.222276] ? mark_held_locks+0xc9/0x160 [ 728.226418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.231980] ? iov_iter_fault_in_readable+0x23d/0x460 [ 728.237162] ? iov_iter_get_pages_alloc+0x1510/0x1510 [ 728.243994] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 728.249009] ? ktime_get_coarse_real_ts64+0x23b/0x390 [ 728.254199] shmem_write_begin+0x110/0x1e0 [ 728.258622] generic_perform_write+0x39a/0x6a0 [ 728.263209] ? add_page_wait_queue+0x2a0/0x2a0 [ 728.267870] ? file_update_time+0xdc/0x640 [ 728.272106] ? current_time+0x180/0x180 [ 728.276074] ? lock_downgrade+0x8e0/0x8e0 [ 728.280222] ? __might_sleep+0x95/0x190 [ 728.284201] ? down_write+0x87/0x120 [ 728.287905] ? generic_file_write_iter+0xe5/0x850 [ 728.292745] __generic_file_write_iter+0x26e/0x630 [ 728.297681] generic_file_write_iter+0x430/0x850 [ 728.302434] ? __generic_file_write_iter+0x630/0x630 [ 728.307532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.313088] ? iov_iter_init+0xc9/0x1f0 [ 728.317067] __vfs_write+0x64d/0x960 [ 728.320780] ? kernel_read+0x120/0x120 [ 728.324671] ? __lock_is_held+0xb5/0x140 [ 728.328739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.334281] ? __sb_start_write+0x17f/0x300 [ 728.338609] vfs_write+0x1f8/0x560 [ 728.342148] ksys_pwrite64+0x174/0x1a0 [ 728.346207] ? __ia32_sys_pread64+0xf0/0xf0 [ 728.350560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 728.356093] ? fput+0x130/0x1a0 [ 728.359366] ? do_sys_ftruncate+0x44e/0x560 [ 728.363681] __x64_sys_pwrite64+0x97/0xf0 [ 728.367837] do_syscall_64+0x1b1/0x800 [ 728.371719] ? finish_task_switch+0x1ca/0x840 [ 728.376208] ? syscall_return_slowpath+0x5c0/0x5c0 [ 728.381130] ? syscall_return_slowpath+0x30f/0x5c0 [ 728.386061] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 728.391421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.396261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.401441] RIP: 0033:0x40fcc7 2018/06/05 09:47:49 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0xffffffffffffffff, 0x3, 0x0, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000004c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) fchdir(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xe, 0x4, 0x4, 0x8000000000009, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') sendmsg$key(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x2, 0xa, 0x10000, 0x7, 0x32, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_address={0x3, 0x7, 0x32, 0x80, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}}, @sadb_lifetime={0x4, 0x2, 0x7fffffff, 0x3, 0x7fffffff, 0x8}, @sadb_key={0x1f, 0x8, 0x768, 0x0, "f1cd7634cdd1f218508ca36c72d92f1ee5d912d91a41d9e5da564903d54e339e635110877790b34709ce61a88c8b91c877de587777e402fd056417a7316cc007f5b3380e69cc77d21459ffe2c332aff4af84f7e3687e5027a92bb0b0bf5fe4690cf408664ddfbb395706409737527c1063ef4c5ee167f6b87235ab183559fd4a81628ab078e76674059728ce5c42e8fdcbcdbf1061403c7e954032a1281cae4d112d97f10b107afb43efc3af7d562051fdfa7ad1416942c62b9e023f8c876d8adb718e0e6d0bdb9c21057be9b8ee1274971684d6a9cc9e3878bc5551d5aab2526d85868f37f287e63adcf3e61d"}, @sadb_x_sec_ctx={0x8, 0x18, 0x3, 0x6, 0x34, "eb8f8c7b5d8705b5f7986f63fd7267420a51ab296c65fd46bfebc1bcd25efd4748b6f084dcc80980d61e3d93b8b6774bb1501483"}, @sadb_ident={0x2, 0xb, 0x7fffffff, 0x0, 0x3}]}, 0x190}, 0x1}, 0x4000800) stat(&(0x7f0000000140)='./control\x00', &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x0, 0x7fff, 0xffffffffffffff7f, 0x3, r0, 0xce}, 0x2c) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xd0800, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000180), 0x4) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000000c0)) 2018/06/05 09:47:49 executing program 6 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:49 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x2000000000000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 728.404623] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 728.424221] RSP: 002b:00007efe324f9ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 728.431932] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fcc7 [ 728.439202] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 [ 728.446563] RBP: 0000000000000000 R08: 0000000020000318 R09: 0000000000000000 [ 728.453821] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 728.461170] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000004 2018/06/05 09:47:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000402004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf803000000000000]}, 0x10) 2018/06/05 09:47:50 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x40030000000000, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = dup2(r0, r0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/66) getsockname$packet(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x14) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000140)=""/212) 2018/06/05 09:47:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000001c0)=0x0) sched_setparam(r0, &(0x7f0000000200)=0x10001) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x418881, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180)={0x6, 0x1}, 0x2) 2018/06/05 09:47:50 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 728.983947] FAULT_INJECTION: forcing a failure. [ 728.983947] name failslab, interval 1, probability 0, space 0, times 0 [ 729.005952] CPU: 0 PID: 19985 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 729.012900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.022651] Call Trace: [ 729.025259] dump_stack+0x1b9/0x294 [ 729.028910] ? dump_stack_print_info.cold.2+0x52/0x52 2018/06/05 09:47:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f0]}, 0x10) [ 729.034121] ? print_usage_bug+0xc0/0xc0 [ 729.038289] should_fail.cold.4+0xa/0x1a [ 729.042370] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.047494] ? graph_lock+0x170/0x170 [ 729.051325] ? __lock_acquire+0x7f5/0x5140 [ 729.055761] ? print_usage_bug+0xc0/0xc0 [ 729.059858] ? print_usage_bug+0xc0/0xc0 [ 729.063959] ? lock_downgrade+0x8e0/0x8e0 [ 729.068133] ? __lock_acquire+0x7f5/0x5140 [ 729.072385] ? print_usage_bug+0xc0/0xc0 [ 729.076469] ? __lock_acquire+0x7f5/0x5140 [ 729.080752] __should_failslab+0x124/0x180 [ 729.085024] should_failslab+0x9/0x14 [ 729.089026] kmem_cache_alloc+0x47/0x760 [ 729.093112] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 729.099039] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 729.104934] __radix_tree_create+0x4ce/0x820 [ 729.110245] ? radix_tree_maybe_preload_order+0x110/0x110 [ 729.115982] ? find_held_lock+0x36/0x1c0 [ 729.120072] ? graph_lock+0x170/0x170 [ 729.123907] ? __lock_is_held+0xb5/0x140 [ 729.127986] ? print_usage_bug+0xc0/0xc0 [ 729.132063] ? graph_lock+0x170/0x170 [ 729.135890] ? find_held_lock+0x36/0x1c0 [ 729.139977] __radix_tree_insert+0xff/0x8d0 [ 729.144318] ? graph_lock+0x170/0x170 [ 729.148141] ? __radix_tree_create+0x820/0x820 [ 729.152749] ? lock_acquire+0x1dc/0x520 [ 729.156748] ? shmem_add_to_page_cache+0x494/0xdf0 [ 729.161710] ? lock_release+0xa10/0xa10 [ 729.165731] ? kasan_check_write+0x14/0x20 [ 729.169984] ? do_raw_spin_lock+0xc1/0x200 [ 729.174228] shmem_add_to_page_cache+0x96d/0xdf0 [ 729.178980] ? rcu_report_qs_rnp+0x790/0x790 [ 729.183391] ? shmem_put_link+0x270/0x270 [ 729.187910] ? percpu_ref_put_many+0x132/0x230 [ 729.192491] ? percpu_ref_tryget+0x2b0/0x2b0 [ 729.196897] ? find_lock_entry+0x2db/0x8a0 [ 729.201142] ? mem_cgroup_try_charge+0x52f/0xa40 [ 729.205900] ? mem_cgroup_low+0x1d0/0x1d0 [ 729.210045] ? security_vm_enough_memory_mm+0x9d/0xc0 [ 729.215236] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.220771] ? shmem_alloc_and_acct_page+0x312/0x800 [ 729.225865] ? shmem_alloc_hugepage+0x5e0/0x5e0 [ 729.230625] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 729.235637] ? __radix_tree_preload+0x173/0x1d0 [ 729.240302] shmem_getpage_gfp+0x800/0x4190 [ 729.244619] ? rcu_report_qs_rnp+0x790/0x790 [ 729.249038] ? shmem_mfill_atomic_pte+0x1c40/0x1c40 [ 729.254044] ? __lock_acquire+0x7f5/0x5140 [ 729.258275] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 729.263276] ? print_usage_bug+0xc0/0xc0 [ 729.267323] ? __lock_acquire+0x7f5/0x5140 [ 729.271545] ? __wake_up_common_lock+0x1c2/0x300 [ 729.276296] ? print_usage_bug+0xc0/0xc0 [ 729.280350] ? print_usage_bug+0xc0/0xc0 [ 729.284404] ? __lock_acquire+0x7f5/0x5140 [ 729.288813] ? check_noncircular+0x20/0x20 [ 729.293038] ? __lock_acquire+0x7f5/0x5140 [ 729.297352] ? debug_check_no_locks_freed+0x310/0x310 [ 729.302535] ? __lock_acquire+0x7f5/0x5140 [ 729.306762] ? print_usage_bug+0xc0/0xc0 [ 729.310821] ? debug_check_no_locks_freed+0x310/0x310 [ 729.316021] ? print_usage_bug+0xc0/0xc0 [ 729.320077] ? print_usage_bug+0xc0/0xc0 [ 729.324144] ? print_usage_bug+0xc0/0xc0 [ 729.328215] ? print_usage_bug+0xc0/0xc0 [ 729.332270] ? graph_lock+0x170/0x170 [ 729.336077] ? print_usage_bug+0xc0/0xc0 [ 729.340128] ? __lock_acquire+0x7f5/0x5140 [ 729.344355] ? __lock_acquire+0x7f5/0x5140 [ 729.348582] ? graph_lock+0x170/0x170 [ 729.352375] ? graph_lock+0x170/0x170 [ 729.356167] ? find_held_lock+0x36/0x1c0 [ 729.360217] ? print_usage_bug+0xc0/0xc0 [ 729.364298] ? lock_downgrade+0x8e0/0x8e0 [ 729.368435] ? lock_release+0xa10/0xa10 [ 729.372492] ? mark_held_locks+0xc9/0x160 [ 729.376637] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.382171] ? iov_iter_fault_in_readable+0x23d/0x460 [ 729.387439] ? iov_iter_get_pages_alloc+0x1510/0x1510 [ 729.392618] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 729.397628] ? ktime_get_coarse_real_ts64+0x23b/0x390 [ 729.402818] shmem_write_begin+0x110/0x1e0 [ 729.407068] generic_perform_write+0x39a/0x6a0 [ 729.411649] ? add_page_wait_queue+0x2a0/0x2a0 [ 729.416232] ? file_update_time+0xdc/0x640 [ 729.420455] ? current_time+0x180/0x180 [ 729.424590] ? lock_downgrade+0x8e0/0x8e0 [ 729.428728] ? __might_sleep+0x95/0x190 [ 729.432780] ? down_write+0x87/0x120 [ 729.436483] ? generic_file_write_iter+0xe5/0x850 [ 729.441315] __generic_file_write_iter+0x26e/0x630 [ 729.446236] generic_file_write_iter+0x430/0x850 [ 729.450982] ? __generic_file_write_iter+0x630/0x630 [ 729.456081] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.461630] ? iov_iter_init+0xc9/0x1f0 [ 729.465595] __vfs_write+0x64d/0x960 [ 729.469298] ? kernel_read+0x120/0x120 [ 729.473176] ? __lock_is_held+0xb5/0x140 [ 729.477234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.482778] ? __sb_start_write+0x17f/0x300 [ 729.487091] vfs_write+0x1f8/0x560 [ 729.490633] ksys_pwrite64+0x174/0x1a0 [ 729.494510] ? __ia32_sys_pread64+0xf0/0xf0 [ 729.498831] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 729.504355] ? fput+0x130/0x1a0 [ 729.507628] ? do_sys_ftruncate+0x44e/0x560 [ 729.511939] __x64_sys_pwrite64+0x97/0xf0 [ 729.516094] do_syscall_64+0x1b1/0x800 [ 729.519983] ? finish_task_switch+0x1ca/0x840 [ 729.524470] ? syscall_return_slowpath+0x5c0/0x5c0 [ 729.529646] ? syscall_return_slowpath+0x30f/0x5c0 [ 729.534578] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 729.540114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.544949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.550128] RIP: 0033:0x40fcc7 [ 729.553323] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 729.572575] RSP: 002b:00007efe324f9ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 729.580291] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fcc7 [ 729.587557] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 [ 729.594917] RBP: 0000000000000000 R08: 0000000020000318 R09: 0000000000000000 [ 729.602184] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 729.609438] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000005 2018/06/05 09:47:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x404002, 0x0) getpeername$unix(r0, &(0x7f00000002c0), &(0x7f0000000340)=0x12c92f79) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:51 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x24]}, 0x10) 2018/06/05 09:47:51 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f00000000c0)='./control\x00', &(0x7f0000000100)='./file0\x00') 2018/06/05 09:47:51 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000002002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 729.835359] FAULT_INJECTION: forcing a failure. [ 729.835359] name failslab, interval 1, probability 0, space 0, times 0 [ 729.846724] CPU: 0 PID: 20034 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 729.853668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.863036] Call Trace: [ 729.865647] dump_stack+0x1b9/0x294 [ 729.869332] ? dump_stack_print_info.cold.2+0x52/0x52 [ 729.874564] ? add_page_wait_queue+0x2a0/0x2a0 [ 729.879191] should_fail.cold.4+0xa/0x1a [ 729.883287] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.888437] ? up_write+0x72/0x210 [ 729.891992] ? up_read+0x110/0x110 [ 729.895544] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.901092] ? __generic_file_write_iter+0x1bd/0x630 [ 729.906206] ? find_held_lock+0x36/0x1c0 [ 729.910291] ? check_same_owner+0x320/0x320 [ 729.914612] ? rcu_note_context_switch+0x710/0x710 [ 729.919538] ? lock_downgrade+0x8e0/0x8e0 [ 729.923679] __should_failslab+0x124/0x180 [ 729.927913] should_failslab+0x9/0x14 [ 729.931703] kmem_cache_alloc+0x2af/0x760 [ 729.935867] getname_flags+0xd0/0x5a0 [ 729.939674] ? __sb_end_write+0xac/0xe0 [ 729.943657] getname+0x19/0x20 [ 729.946859] do_sys_open+0x39a/0x740 [ 729.950587] ? filp_open+0x80/0x80 [ 729.954119] ? do_sys_ftruncate+0x44e/0x560 [ 729.958438] __x64_sys_open+0x7e/0xc0 [ 729.962234] do_syscall_64+0x1b1/0x800 [ 729.966120] ? finish_task_switch+0x1ca/0x840 [ 729.970607] ? syscall_return_slowpath+0x5c0/0x5c0 [ 729.975543] ? syscall_return_slowpath+0x30f/0x5c0 [ 729.980471] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 729.985838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.990697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.995876] RIP: 0033:0x40fc61 [ 729.999052] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 730.018390] RSP: 002b:00007efe324f9ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 730.026093] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 000000000040fc61 2018/06/05 09:47:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500fffffffb02004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:51 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 730.033356] RDX: 00007efe324f9bfa RSI: 0000000000000002 RDI: 00007efe324f9bf0 [ 730.040644] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 730.048257] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 730.055522] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000006 2018/06/05 09:47:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:51 executing program 0: setxattr(&(0x7f0000000040)='./control\x00', &(0x7f00000000c0)=@random={'security.', "d000"}, &(0x7f0000000100)='.}!cpuset\x00', 0xa, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f636772bb5cc4cb", 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf203000000000000]}, 0x10) 2018/06/05 09:47:51 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./file0/file1\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') ioctl(r0, 0x1, &(0x7f0000000180)="6639b285bc2d07b58bd4477536b0942ae6a440db419bb05464e5d7814bee1905503659eb4a97785c7d51f5daf42522551912c9c7772883310f927dd5cbafa20fc820a6b5234ac27249f20371844b4da883f435d4105f996426fd62b2c75a44ef5ebd3cad8a6e43606cc720778cbbc510fba636d700dd4bbbb6b93042e4131a2f85a9c70513824af7f4fba755e228a26146d4e06ae834ea2971fb45bb3b81d2e07af931ed66ffef86db15225342ed0c0a7f3257812d19dba0edf7d59865b36a401140f7ce45392c416b4e0bd42cc5ec9cf3e128aa37455f056eb3503f66049eda1d394dece2cebc312da0aa2edaea32809961a65d9df113") 2018/06/05 09:47:51 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005007fffffff02004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000100)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000102004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x10) 2018/06/05 09:47:52 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:52 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)=""/90, 0x5a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:52 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet6_int(r1, 0x29, 0xcf, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101002, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xe, &(0x7f0000000180)=""/88, &(0x7f0000000200)=0x58) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x200, @loopback={0x0, 0x1}, 0x9b64}], 0x1c) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x24010000]}, 0x10) 2018/06/05 09:47:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000008004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 730.591967] FAULT_INJECTION: forcing a failure. [ 730.591967] name failslab, interval 1, probability 0, space 0, times 0 [ 730.603593] CPU: 1 PID: 20115 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 730.610542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.619971] Call Trace: [ 730.622841] dump_stack+0x1b9/0x294 [ 730.626503] ? dump_stack_print_info.cold.2+0x52/0x52 [ 730.631725] should_fail.cold.4+0xa/0x1a [ 730.635901] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 730.641038] ? debug_check_no_locks_freed+0x310/0x310 [ 730.646258] ? do_writepages+0x1a0/0x1a0 [ 730.650348] ? set_page_dirty+0x367/0x6d0 [ 730.654522] ? find_held_lock+0x36/0x1c0 [ 730.658629] ? check_same_owner+0x320/0x320 [ 730.662978] ? rcu_note_context_switch+0x710/0x710 [ 730.667931] ? graph_lock+0x170/0x170 [ 730.671755] __should_failslab+0x124/0x180 [ 730.676017] should_failslab+0x9/0x14 [ 730.679839] kmem_cache_alloc+0x2af/0x760 [ 730.684019] ? debug_check_no_locks_freed+0x310/0x310 [ 730.689355] get_empty_filp+0x125/0x520 [ 730.693352] ? proc_nr_files+0x60/0x60 [ 730.697621] ? lock_downgrade+0x8e0/0x8e0 [ 730.701789] ? graph_lock+0x170/0x170 [ 730.705608] ? kasan_check_read+0x11/0x20 [ 730.709773] ? rcu_is_watching+0x85/0x140 [ 730.713938] ? rcu_report_qs_rnp+0x790/0x790 [ 730.718364] path_openat+0x116/0x4dc0 [ 730.722190] ? unwind_get_return_address+0x61/0xa0 [ 730.727136] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 730.732430] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 730.737209] ? find_held_lock+0x36/0x1c0 [ 730.741296] ? lock_downgrade+0x8e0/0x8e0 [ 730.745459] ? do_sys_open+0x39a/0x740 [ 730.749366] ? kasan_check_read+0x11/0x20 [ 730.753534] ? do_raw_spin_unlock+0x9e/0x2e0 [ 730.757962] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 730.762562] ? __lock_is_held+0xb5/0x140 [ 730.766647] ? _raw_spin_unlock+0x22/0x30 [ 730.770810] ? __alloc_fd+0x346/0x700 [ 730.774642] ? usercopy_warn+0x120/0x120 [ 730.778736] do_filp_open+0x249/0x350 [ 730.782557] ? may_open_dev+0x100/0x100 [ 730.786548] ? strncpy_from_user+0x3b6/0x500 [ 730.790987] ? mpi_free.cold.1+0x19/0x19 [ 730.795076] ? get_unused_fd_flags+0x121/0x190 [ 730.799664] ? getname_flags+0xd0/0x5a0 [ 730.803639] ? getname_flags+0x26e/0x5a0 [ 730.807712] ? __sb_end_write+0xac/0xe0 [ 730.811690] do_sys_open+0x56f/0x740 [ 730.815402] ? filp_open+0x80/0x80 [ 730.818938] ? do_sys_ftruncate+0x44e/0x560 [ 730.823256] __x64_sys_open+0x7e/0xc0 [ 730.827052] do_syscall_64+0x1b1/0x800 [ 730.830929] ? finish_task_switch+0x1ca/0x840 [ 730.835419] ? syscall_return_slowpath+0x5c0/0x5c0 [ 730.840353] ? syscall_return_slowpath+0x30f/0x5c0 [ 730.845281] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 730.850640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 730.855496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.860678] RIP: 0033:0x40fc61 [ 730.863853] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 730.883398] RSP: 002b:00007efe324f9ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 2018/06/05 09:47:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x10) 2018/06/05 09:47:52 executing program 0: socketpair(0x2, 0x80001, 0x1000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x6, 0x8, 0x5, "ed66432b13b1418f86b4608fde1a75807b080b0e0efd9f1d79edfbc625cb2dfc5b96bd1b29eb746e81a8ce969d8fd4ca2e0e6bd21cc6786742c98c69cfc53381", "652dc2fe60cb672d072377e2776cc1f740834dea00f8c67e1f735ed830cc4008", [0x60, 0x4]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') openat(r1, &(0x7f00000001c0)='./file0\x00', 0x40, 0x102) 2018/06/05 09:47:52 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000002b004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 730.891098] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 000000000040fc61 [ 730.898369] RDX: 00007efe324f9bfa RSI: 0000000000000002 RDI: 00007efe324f9bf0 [ 730.905629] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 730.912886] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 730.920153] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000007 2018/06/05 09:47:52 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./control\x00', 0x0) 2018/06/05 09:47:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec03]}, 0x10) 2018/06/05 09:47:52 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000004000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:52 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:52 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) read(r0, &(0x7f0000000040)=""/7, 0x7) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x10) 2018/06/05 09:47:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000017004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 731.407780] FAULT_INJECTION: forcing a failure. [ 731.407780] name failslab, interval 1, probability 0, space 0, times 0 [ 731.419152] CPU: 0 PID: 20196 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 731.426092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.435461] Call Trace: [ 731.438081] dump_stack+0x1b9/0x294 [ 731.441735] ? dump_stack_print_info.cold.2+0x52/0x52 [ 731.446948] ? perf_trace_lock_acquire+0xe3/0x980 [ 731.451821] should_fail.cold.4+0xa/0x1a [ 731.455897] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 731.461008] ? debug_check_no_locks_freed+0x310/0x310 [ 731.466190] ? perf_trace_lock_acquire+0xe3/0x980 [ 731.471054] ? do_writepages+0x1a0/0x1a0 [ 731.475109] ? set_page_dirty+0x367/0x6d0 [ 731.479252] ? find_held_lock+0x36/0x1c0 [ 731.483324] ? check_same_owner+0x320/0x320 [ 731.487640] ? rcu_note_context_switch+0x710/0x710 [ 731.492559] ? graph_lock+0x170/0x170 [ 731.496357] __should_failslab+0x124/0x180 [ 731.500589] should_failslab+0x9/0x14 [ 731.504386] kmem_cache_alloc+0x2af/0x760 [ 731.508532] ? debug_check_no_locks_freed+0x310/0x310 [ 731.513719] get_empty_filp+0x125/0x520 [ 731.517686] ? proc_nr_files+0x60/0x60 [ 731.521570] ? lock_downgrade+0x8e0/0x8e0 [ 731.525715] ? graph_lock+0x170/0x170 [ 731.529512] ? perf_trace_lock_acquire+0xe3/0x980 [ 731.534347] ? rcu_is_watching+0x85/0x140 [ 731.538495] ? rcu_report_qs_rnp+0x790/0x790 [ 731.542900] path_openat+0x116/0x4dc0 [ 731.546705] ? unwind_get_return_address+0x61/0xa0 [ 731.551630] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 731.556639] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 731.561391] ? find_held_lock+0x36/0x1c0 [ 731.565468] ? lock_downgrade+0x8e0/0x8e0 [ 731.569631] ? kasan_check_read+0x11/0x20 [ 731.573773] ? do_raw_spin_unlock+0x9e/0x2e0 [ 731.578173] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 731.582746] ? __lock_is_held+0xb5/0x140 [ 731.586806] ? _raw_spin_unlock+0x22/0x30 [ 731.590944] ? __alloc_fd+0x346/0x700 [ 731.594745] ? usercopy_warn+0x120/0x120 [ 731.598809] do_filp_open+0x249/0x350 [ 731.602606] ? may_open_dev+0x100/0x100 [ 731.606575] ? strncpy_from_user+0x3b6/0x500 [ 731.610980] ? mpi_free.cold.1+0x19/0x19 [ 731.615042] ? get_unused_fd_flags+0x121/0x190 [ 731.619613] ? getname_flags+0xd0/0x5a0 [ 731.623583] ? getname_flags+0x26e/0x5a0 [ 731.627637] ? __sb_end_write+0xac/0xe0 [ 731.631608] do_sys_open+0x56f/0x740 [ 731.635332] ? filp_open+0x80/0x80 [ 731.638865] ? do_sys_ftruncate+0x44e/0x560 [ 731.643181] __x64_sys_open+0x7e/0xc0 [ 731.646976] do_syscall_64+0x1b1/0x800 [ 731.650853] ? finish_task_switch+0x1ca/0x840 [ 731.655338] ? syscall_return_slowpath+0x5c0/0x5c0 [ 731.660258] ? syscall_return_slowpath+0x30f/0x5c0 [ 731.665187] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 731.670546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 731.675385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.680571] RIP: 0033:0x40fc61 [ 731.683745] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 2018/06/05 09:47:53 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:53 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)={{}, {r0, r1/1000+30000}}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:53 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 731.703092] RSP: 002b:00007efe324f9ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 731.710794] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 000000000040fc61 [ 731.718067] RDX: 00007efe324f9bfa RSI: 0000000000000002 RDI: 00007efe324f9bf0 [ 731.725324] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 731.732585] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 731.739844] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000008 2018/06/05 09:47:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf8]}, 0x10) 2018/06/05 09:47:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff00000002000000000300050000fffffffd004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:53 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:53 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:53 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500007fffffff004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:53 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:53 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, &(0x7f0000000440)=0x80, 0x80000) r2 = accept4$bt_l2cap(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'teql0\x00', 0x200}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0x3f, 0x0, 0x1, r0}) io_setup(0x7, &(0x7f0000000500)=0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio\x00', 0x2000, 0x0) io_cancel(r3, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x4, r2, &(0x7f0000000540)="8feff42357de238cb5f9e8f89fc4eb6cdd50610c25776734376700dd7d62d87800f1e1c3092dc3369b3bb16f18b0c4d27cbc3cdb6c8dfe94e97a2a4266f8edd9039b09c5f47e59654fb3e96329da034c8ecfb96d36a870fea63755681d224eea6442cfe32327478d07db4e04a8de67b6f13f5e9a28f6d8eca353c82df62e57cf4149fedd9404b2af9cbc4130e6a84a7e73516278d077534084d4682fa36174f02638f01db6fe9403a63e4e", 0xab, 0xdf07, 0x0, 0x0, r4}, &(0x7f0000000680)) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x202000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000240)={'rose0\x00'}) fchdir(r2) ioctl$KVM_SET_PIT2(r5, 0x4070aea0, &(0x7f0000000280)={[{0x1, 0x800, 0x3ed6, 0xa1, 0x8000, 0xffffffffffff8000, 0xf0, 0x3, 0x1, 0xbe46, 0x586c, 0x1, 0xffffffff}, {0x0, 0xa1, 0x2, 0x0, 0x3000000000000000, 0x80, 0x100000001, 0x7, 0x8000, 0xffffffff, 0x1, 0x32, 0x8}, {0x0, 0x7ff, 0x0, 0x8, 0x9, 0xee, 0x4, 0x7, 0x4, 0x2, 0x694, 0xe66, 0x7}], 0x401}) vmsplice(r2, &(0x7f0000000900)=[{&(0x7f00000006c0)="e313fe61f9ea63cdab4c1ac93b687d553343e3fca785747195219c236e817b5b26aa196d78c0d94927e2046a9c39e9410e4e7bb3ae0531b8885d4a1b29d773ce2556dd0ff03eafa9b8acda40cfe6230748aaf2cf65c52a51d7bbafebe22ae0c468ef6f52e0287dc90c41554f4736d030a67719c4803fd712ad8e48a89b1b1bd6e66f9afd803a8ccf28de4e", 0x8b}, {&(0x7f0000000780)="eb13a55cd706d8b4e0696d147006115c8f1484af51943c6c56d75b331eb0f266ac9a0c1638f5c52de7e4db21ca6786aee055848b1ac7bffc20b34fd51727e68b86df187745021d88ded06cd4ea7257b6871788a87348134f41671c8cc022f907469423564a", 0x65}, {&(0x7f0000000800)="101d82f9b08e22397e4ac052af8fb2c670cd1c165b33c3223e81674c88e46af91d017bee6c884b2cd23d9bed37d65eb0a91e24ef6fa2e136cbe21d0b5417ca65b651df6cc433aa577a59f72717bc12bb1803f1305b235a03e19c96a6fccacdc49aa71828c2818497b5fb63f261cf2e6d071394973c0dadeecd1121f77ca30ac45a1f6501e7e616be62f7c36e1c375fb9abf5bc16be78c4ddf147aa0bca0ac778210df085b8217e1362d1c8640768fd7e40e817d06df1ee69ead48f0566725ac2ffa2", 0xc2}], 0x3, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000009c0)={0x0, 0x85, "08c23c0795a5a1eb59588b96705bdc48436a90680061be38d382f073c69afdc0d5c2de8551914e8b0a508c23b679206ad8578c1a6c6cbcf4b9ae01b5e24c5d854f579b2caca1c363d4dd558c5c45adc4623e6352b885c80f37b485ba9b55a6546411deec34ce4e1ce54eb1c6da8d1a752e60aa080a53092879bafb2bc6aefd74c474dd4bc0"}, &(0x7f0000000a80)=0x8d) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000ac0)={r6, 0x10001}, &(0x7f0000000b00)=0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000480)=0x0) ptrace$getenv(0x4201, r7, 0x0, &(0x7f00000004c0)) getsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000340), &(0x7f0000000380)=0x4) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf800000000000000]}, 0x10) [ 732.138573] FAULT_INJECTION: forcing a failure. [ 732.138573] name failslab, interval 1, probability 0, space 0, times 0 [ 732.149924] CPU: 1 PID: 20277 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 732.156871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.166237] Call Trace: [ 732.168844] dump_stack+0x1b9/0x294 [ 732.172494] ? dump_stack_print_info.cold.2+0x52/0x52 [ 732.177805] should_fail.cold.4+0xa/0x1a [ 732.181883] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 732.187017] ? lock_release+0xa10/0xa10 [ 732.191018] ? check_same_owner+0x320/0x320 [ 732.195353] ? graph_lock+0x170/0x170 [ 732.199170] ? print_usage_bug+0xc0/0xc0 [ 732.203250] ? graph_lock+0x170/0x170 [ 732.207412] ? find_held_lock+0x36/0x1c0 [ 732.211483] ? __lock_is_held+0xb5/0x140 [ 732.215562] ? check_same_owner+0x320/0x320 [ 732.219900] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 732.224937] ? rcu_note_context_switch+0x710/0x710 [ 732.229879] __should_failslab+0x124/0x180 [ 732.234112] should_failslab+0x9/0x14 [ 732.237906] kmem_cache_alloc_trace+0x2cb/0x780 [ 732.242566] ? init_wait_entry+0x1b0/0x1b0 [ 732.246802] ? loop_get_status64+0x140/0x140 [ 732.251201] __kthread_create_on_node+0x127/0x4c0 [ 732.256044] ? __kthread_parkme+0x1d0/0x1d0 [ 732.260362] ? __raw_spin_lock_init+0x1c/0x100 [ 732.264943] ? __lockdep_init_map+0x105/0x590 [ 732.269436] ? loop_get_status64+0x140/0x140 [ 732.273836] kthread_create_on_node+0xa8/0xd0 [ 732.278333] ? __kthread_create_on_node+0x4c0/0x4c0 [ 732.283344] ? rcu_report_qs_rnp+0x790/0x790 [ 732.287749] lo_ioctl+0x1287/0x2190 [ 732.291372] ? lo_rw_aio_complete+0x430/0x430 [ 732.295861] blkdev_ioctl+0x9b6/0x2020 [ 732.299740] ? blkpg_ioctl+0xc40/0xc40 [ 732.303624] ? lock_downgrade+0x8e0/0x8e0 [ 732.307766] ? kasan_check_read+0x11/0x20 [ 732.311926] ? rcu_is_watching+0x85/0x140 [ 732.316079] ? rcu_report_qs_rnp+0x790/0x790 [ 732.320487] ? __fget+0x40c/0x650 [ 732.323939] ? expand_files.part.8+0x9a0/0x9a0 [ 732.328518] ? trace_hardirqs_off+0xd/0x10 [ 732.332742] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 732.337841] block_ioctl+0xee/0x130 [ 732.341461] ? blkdev_fallocate+0x400/0x400 [ 732.345775] do_vfs_ioctl+0x1cf/0x16f0 [ 732.349754] ? rcu_pm_notify+0xc0/0xc0 [ 732.353634] ? ioctl_preallocate+0x2e0/0x2e0 [ 732.358042] ? fget_raw+0x20/0x20 [ 732.361625] ? putname+0xf2/0x130 [ 732.365079] ? rcu_read_lock_sched_held+0x108/0x120 [ 732.370087] ? kmem_cache_free+0x25c/0x2d0 [ 732.374315] ? putname+0xf7/0x130 [ 732.377765] ? do_sys_open+0x3c3/0x740 [ 732.381664] ? security_file_ioctl+0x94/0xc0 [ 732.386063] ksys_ioctl+0xa9/0xd0 [ 732.389510] __x64_sys_ioctl+0x73/0xb0 [ 732.393387] do_syscall_64+0x1b1/0x800 [ 732.397263] ? finish_task_switch+0x1ca/0x840 [ 732.401749] ? syscall_return_slowpath+0x5c0/0x5c0 [ 732.406670] ? syscall_return_slowpath+0x30f/0x5c0 [ 732.411594] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 732.416956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.421798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.426986] RIP: 0033:0x455877 [ 732.430162] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.449491] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 732.457194] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 732.464452] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 732.471712] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 732.479501] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 2018/06/05 09:47:54 executing program 0: r0 = dup(0xffffffffffffffff) r1 = geteuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000003f004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:54 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 732.486766] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000009 2018/06/05 09:47:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x10) 2018/06/05 09:47:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:54 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:54 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = semget$private(0x0, 0x3, 0x10) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000000c0)=""/237) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:54 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 732.894223] FAULT_INJECTION: forcing a failure. [ 732.894223] name failslab, interval 1, probability 0, space 0, times 0 [ 732.905589] CPU: 1 PID: 20328 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 732.912527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.921892] Call Trace: [ 732.924504] dump_stack+0x1b9/0x294 [ 732.928154] ? dump_stack_print_info.cold.2+0x52/0x52 [ 732.933371] ? __account_cfs_rq_runtime+0x600/0x600 [ 732.938401] should_fail.cold.4+0xa/0x1a [ 732.942454] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 732.947554] ? graph_lock+0x170/0x170 [ 732.951338] ? enqueue_entity+0x343/0x2110 [ 732.955578] ? find_held_lock+0x36/0x1c0 [ 732.959628] ? __lock_is_held+0xb5/0x140 [ 732.963682] ? check_same_owner+0x320/0x320 [ 732.967992] ? task_fork_fair+0x660/0x660 [ 732.972135] ? rcu_note_context_switch+0x710/0x710 [ 732.977056] __should_failslab+0x124/0x180 [ 732.981279] should_failslab+0x9/0x14 [ 732.985065] kmem_cache_alloc+0x2af/0x760 [ 732.989196] ? graph_lock+0x170/0x170 [ 732.993000] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 732.998025] __kernfs_new_node+0xe7/0x580 [ 733.002171] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 733.006920] ? lock_downgrade+0x8e0/0x8e0 [ 733.011059] ? lock_release+0xa10/0xa10 [ 733.015027] ? check_same_owner+0x320/0x320 [ 733.019347] ? rcu_note_context_switch+0x710/0x710 [ 733.024268] kernfs_new_node+0x80/0xf0 [ 733.028142] kernfs_create_dir_ns+0x3d/0x140 [ 733.032539] internal_create_group+0x110/0x970 [ 733.037108] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 733.042125] sysfs_create_group+0x1f/0x30 [ 733.046260] lo_ioctl+0x1771/0x2190 [ 733.049875] ? lo_rw_aio_complete+0x430/0x430 [ 733.054356] blkdev_ioctl+0x9b6/0x2020 [ 733.058229] ? blkpg_ioctl+0xc40/0xc40 [ 733.062101] ? lock_downgrade+0x8e0/0x8e0 [ 733.066235] ? kasan_check_read+0x11/0x20 [ 733.070368] ? rcu_is_watching+0x85/0x140 [ 733.074507] ? rcu_report_qs_rnp+0x790/0x790 [ 733.078903] ? __fget+0x40c/0x650 [ 733.082349] ? expand_files.part.8+0x9a0/0x9a0 [ 733.086923] ? trace_hardirqs_off+0xd/0x10 [ 733.091149] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 733.096249] block_ioctl+0xee/0x130 [ 733.099865] ? blkdev_fallocate+0x400/0x400 [ 733.104179] do_vfs_ioctl+0x1cf/0x16f0 [ 733.108055] ? rcu_pm_notify+0xc0/0xc0 [ 733.111939] ? ioctl_preallocate+0x2e0/0x2e0 [ 733.116330] ? fget_raw+0x20/0x20 [ 733.119765] ? putname+0xf2/0x130 [ 733.123205] ? rcu_read_lock_sched_held+0x108/0x120 [ 733.128208] ? kmem_cache_free+0x25c/0x2d0 [ 733.132429] ? putname+0xf7/0x130 [ 733.135879] ? do_sys_open+0x3c3/0x740 [ 733.139772] ? security_file_ioctl+0x94/0xc0 [ 733.144176] ksys_ioctl+0xa9/0xd0 [ 733.147622] __x64_sys_ioctl+0x73/0xb0 [ 733.151498] do_syscall_64+0x1b1/0x800 [ 733.155383] ? finish_task_switch+0x1ca/0x840 [ 733.159875] ? syscall_return_slowpath+0x5c0/0x5c0 [ 733.164878] ? syscall_return_slowpath+0x30f/0x5c0 [ 733.169815] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 733.175170] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 733.180008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.185193] RIP: 0033:0x455877 [ 733.188373] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.208269] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 733.215978] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 733.223242] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 733.230503] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 733.237760] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 2018/06/05 09:47:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000004004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000003c0)='./file0/*ile1\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="ebc4330c373072c43c906d6b66732e666174000204010002000270f7f8", 0x1d}], 0x80, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x84000) pwrite64(r0, &(0x7f0000000180)="24d45de954cabbbc1c861496b1150f044686ecf6af98b1a1081dd1af919c7859b9d48bf6ca9b9b7563fdec109362c089df827b427df877b4c6f929e078902e4bf133a81e2f18e27caa47584692d1d2f71f9eefda12c60872dee05f2f78d1e2457d458f53b3998b437a46b0263b437d1ef4c95800a8239cd416e3349f7b352abf23c397317677cb8de9ca3da9aaa38f8aff9170bfffa3f5057bf3b17c6e81f4dda1631e5438d46a0bf9a240fd45", 0xad, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf103000000000000]}, 0x10) 2018/06/05 09:47:54 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x442201, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 2018/06/05 09:47:54 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:54 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 733.245025] R13: 0000000000000001 R14: 0000000000700008 R15: 000000000000000a [ 733.411185] FAULT_INJECTION: forcing a failure. [ 733.411185] name failslab, interval 1, probability 0, space 0, times 0 [ 733.422762] CPU: 1 PID: 20363 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 733.429709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.439077] Call Trace: [ 733.441808] dump_stack+0x1b9/0x294 [ 733.445459] ? dump_stack_print_info.cold.2+0x52/0x52 [ 733.450671] ? perf_trace_lock_acquire+0xe3/0x980 [ 733.455547] should_fail.cold.4+0xa/0x1a [ 733.459629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 733.464840] ? find_held_lock+0x36/0x1c0 [ 733.468926] ? graph_lock+0x170/0x170 [ 733.472751] ? find_held_lock+0x36/0x1c0 [ 733.476835] ? __lock_is_held+0xb5/0x140 [ 733.480941] ? check_same_owner+0x320/0x320 [ 733.485290] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 733.490249] ? rcu_note_context_switch+0x710/0x710 [ 733.495197] __should_failslab+0x124/0x180 [ 733.499553] should_failslab+0x9/0x14 [ 733.503631] kmem_cache_alloc+0x2af/0x760 [ 733.507795] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 733.512753] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 733.517794] __kernfs_new_node+0xe7/0x580 [ 733.521965] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 733.526742] ? mutex_unlock+0xd/0x10 [ 733.530455] ? kernfs_activate+0x20e/0x2a0 [ 733.534683] ? kernfs_walk_and_get_ns+0x320/0x320 [ 733.539525] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 733.545054] ? kernfs_link_sibling+0x1d2/0x3b0 [ 733.549638] kernfs_new_node+0x80/0xf0 [ 733.553524] __kernfs_create_file+0x4d/0x330 [ 733.558022] sysfs_add_file_mode_ns+0x21a/0x560 [ 733.562696] internal_create_group+0x282/0x970 [ 733.567279] sysfs_create_group+0x1f/0x30 [ 733.571432] lo_ioctl+0x1771/0x2190 [ 733.575060] ? lo_rw_aio_complete+0x430/0x430 [ 733.579561] blkdev_ioctl+0x9b6/0x2020 [ 733.583443] ? blkpg_ioctl+0xc40/0xc40 [ 733.587322] ? lock_downgrade+0x8e0/0x8e0 [ 733.591479] ? kasan_check_read+0x11/0x20 [ 733.595616] ? rcu_is_watching+0x85/0x140 [ 733.599757] ? rcu_report_qs_rnp+0x790/0x790 [ 733.604164] ? __fget+0x40c/0x650 [ 733.607798] ? expand_files.part.8+0x9a0/0x9a0 [ 733.612375] ? trace_hardirqs_off+0xd/0x10 [ 733.616615] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 733.621713] block_ioctl+0xee/0x130 [ 733.625330] ? blkdev_fallocate+0x400/0x400 [ 733.629645] do_vfs_ioctl+0x1cf/0x16f0 [ 733.633537] ? rcu_pm_notify+0xc0/0xc0 [ 733.637417] ? ioctl_preallocate+0x2e0/0x2e0 [ 733.641817] ? fget_raw+0x20/0x20 [ 733.645270] ? putname+0xf2/0x130 [ 733.648713] ? rcu_read_lock_sched_held+0x108/0x120 [ 733.653719] ? kmem_cache_free+0x25c/0x2d0 [ 733.657959] ? putname+0xf7/0x130 [ 733.661434] ? do_sys_open+0x3c3/0x740 [ 733.665320] ? security_file_ioctl+0x94/0xc0 [ 733.669723] ksys_ioctl+0xa9/0xd0 [ 733.673169] __x64_sys_ioctl+0x73/0xb0 [ 733.677053] do_syscall_64+0x1b1/0x800 [ 733.680943] ? finish_task_switch+0x1ca/0x840 [ 733.685430] ? syscall_return_slowpath+0x5c0/0x5c0 [ 733.690364] ? syscall_return_slowpath+0x30f/0x5c0 [ 733.695291] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 733.700651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 733.705492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.710774] RIP: 0033:0x455877 [ 733.713959] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.733315] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 733.741112] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 733.748374] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 2018/06/05 09:47:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4400]}, 0x10) 2018/06/05 09:47:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:55 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000002000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 733.755636] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 733.763158] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 733.770422] R13: 0000000000000001 R14: 0000000000700008 R15: 000000000000000b 2018/06/05 09:47:55 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000400)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) sync() fchdir(r1) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x124]}, 0x10) 2018/06/05 09:47:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000001004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:55 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:55 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:55 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="00000000c632377c401b83cf0006000000", 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000100)=0xfffffeb7) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 734.088797] FAULT_INJECTION: forcing a failure. [ 734.088797] name failslab, interval 1, probability 0, space 0, times 0 [ 734.100241] CPU: 1 PID: 20420 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 734.107213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.116581] Call Trace: [ 734.119185] dump_stack+0x1b9/0x294 [ 734.122833] ? dump_stack_print_info.cold.2+0x52/0x52 [ 734.128075] ? mutex_trylock+0x2a0/0x2a0 [ 734.132162] should_fail.cold.4+0xa/0x1a 2018/06/05 09:47:55 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0), 0x10) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) [ 734.136238] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 734.141359] ? __kernfs_new_node+0xe7/0x580 [ 734.145962] ? graph_lock+0x170/0x170 [ 734.149773] ? find_held_lock+0x36/0x1c0 [ 734.153843] ? find_held_lock+0x36/0x1c0 [ 734.157919] ? __lock_is_held+0xb5/0x140 [ 734.162006] ? check_same_owner+0x320/0x320 [ 734.166329] ? graph_lock+0x170/0x170 [ 734.171605] ? rcu_note_context_switch+0x710/0x710 [ 734.176556] ? kasan_check_write+0x14/0x20 [ 734.180812] __should_failslab+0x124/0x180 [ 734.185047] should_failslab+0x9/0x14 [ 734.188838] kmem_cache_alloc+0x2af/0x760 [ 734.192984] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 734.197995] __kernfs_new_node+0xe7/0x580 [ 734.202154] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 734.206906] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 734.212435] ? kernfs_link_sibling+0x1d2/0x3b0 [ 734.217015] ? kernfs_add_one+0x16f/0x620 [ 734.221163] ? kernfs_activate+0x2a0/0x2a0 [ 734.225391] kernfs_new_node+0x80/0xf0 [ 734.229292] __kernfs_create_file+0x4d/0x330 [ 734.233705] sysfs_add_file_mode_ns+0x21a/0x560 [ 734.238390] internal_create_group+0x282/0x970 [ 734.242972] sysfs_create_group+0x1f/0x30 [ 734.247114] lo_ioctl+0x1771/0x2190 [ 734.250749] ? lo_rw_aio_complete+0x430/0x430 [ 734.255258] blkdev_ioctl+0x9b6/0x2020 [ 734.259139] ? blkpg_ioctl+0xc40/0xc40 [ 734.263036] ? lock_downgrade+0x8e0/0x8e0 [ 734.267190] ? kasan_check_read+0x11/0x20 [ 734.271331] ? rcu_is_watching+0x85/0x140 [ 734.275477] ? rcu_report_qs_rnp+0x790/0x790 [ 734.279886] ? __fget+0x40c/0x650 [ 734.283335] ? expand_files.part.8+0x9a0/0x9a0 [ 734.287917] ? trace_hardirqs_off+0xd/0x10 [ 734.292228] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 734.297336] block_ioctl+0xee/0x130 [ 734.300953] ? blkdev_fallocate+0x400/0x400 [ 734.305264] do_vfs_ioctl+0x1cf/0x16f0 [ 734.309139] ? rcu_pm_notify+0xc0/0xc0 [ 734.313027] ? ioctl_preallocate+0x2e0/0x2e0 [ 734.317431] ? fget_raw+0x20/0x20 [ 734.320876] ? putname+0xf2/0x130 [ 734.324321] ? rcu_read_lock_sched_held+0x108/0x120 [ 734.329327] ? kmem_cache_free+0x25c/0x2d0 [ 734.333567] ? putname+0xf7/0x130 [ 734.337018] ? do_sys_open+0x3c3/0x740 [ 734.340906] ? security_file_ioctl+0x94/0xc0 [ 734.345309] ksys_ioctl+0xa9/0xd0 [ 734.348754] __x64_sys_ioctl+0x73/0xb0 [ 734.352645] do_syscall_64+0x1b1/0x800 [ 734.356529] ? finish_task_switch+0x1ca/0x840 [ 734.361021] ? syscall_return_slowpath+0x5c0/0x5c0 [ 734.365955] ? syscall_return_slowpath+0x30f/0x5c0 [ 734.370896] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 734.376255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.381094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.386281] RIP: 0033:0x455877 [ 734.389455] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.408777] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 734.416476] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 734.423743] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 734.431348] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 2018/06/05 09:47:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11c]}, 0x10) 2018/06/05 09:47:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000003004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="0a0a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 734.438621] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 734.445882] R13: 0000000000000001 R14: 0000000000700008 R15: 000000000000000c 2018/06/05 09:47:56 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:56 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='.Ecgroup\x00', 0x200002, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:56 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="030a00090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000000a004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f9]}, 0x10) 2018/06/05 09:47:56 executing program 3: socketpair(0x5, 0x7, 0x8522, &(0x7f00000006c0)={0xffffffffffffffff}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') execve(&(0x7f0000000140)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='@-', &(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='security\x00', &(0x7f0000000240)='-.((vmnet0!\x00', &(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)="6370757365746367726f7570062300", &(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='vfat\x00', &(0x7f0000000400)="2da373797374656d00"], &(0x7f0000000680)=[&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='vfat\x00', &(0x7f0000000600)=']}\x00', &(0x7f0000000640)='user\\\x00']) 2018/06/05 09:47:56 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./bgroup.net/syz1\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:56 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:56 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:56 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x88) ioctl$int_in(r0, 0x5473, &(0x7f0000000000)=0xfffffffffffffff8) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={r0, 0x6, 0x1, 0x1f, &(0x7f00000000c0)=[0x0], 0x1}, 0x20) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x6, {0x2, 0x3, 0x4, 0xfffffffffffffff9, 0x81, 0x3ff}, 0x6, 0x3f}, 0xe) [ 734.924449] FAULT_INJECTION: forcing a failure. [ 734.924449] name failslab, interval 1, probability 0, space 0, times 0 [ 734.935991] CPU: 1 PID: 20492 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 734.942945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.952318] Call Trace: [ 734.954932] dump_stack+0x1b9/0x294 [ 734.958585] ? dump_stack_print_info.cold.2+0x52/0x52 [ 734.963829] ? mutex_trylock+0x2a0/0x2a0 [ 734.967937] should_fail.cold.4+0xa/0x1a 2018/06/05 09:47:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5e000000]}, 0x10) [ 734.972030] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 734.977158] ? __kernfs_new_node+0xe7/0x580 [ 734.981506] ? graph_lock+0x170/0x170 [ 734.985340] ? find_held_lock+0x36/0x1c0 [ 734.989431] ? find_held_lock+0x36/0x1c0 [ 734.993526] ? __lock_is_held+0xb5/0x140 [ 734.997656] ? check_same_owner+0x320/0x320 [ 735.002003] ? graph_lock+0x170/0x170 [ 735.005828] ? rcu_note_context_switch+0x710/0x710 [ 735.010782] ? kasan_check_write+0x14/0x20 [ 735.015041] __should_failslab+0x124/0x180 [ 735.019305] should_failslab+0x9/0x14 [ 735.023135] kmem_cache_alloc+0x2af/0x760 [ 735.027324] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 735.032370] __kernfs_new_node+0xe7/0x580 [ 735.036554] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 735.041345] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 735.046907] ? kernfs_link_sibling+0x1d2/0x3b0 [ 735.051513] ? kernfs_add_one+0x16f/0x620 [ 735.056557] ? kernfs_activate+0x2a0/0x2a0 [ 735.060819] kernfs_new_node+0x80/0xf0 [ 735.064729] __kernfs_create_file+0x4d/0x330 [ 735.069157] sysfs_add_file_mode_ns+0x21a/0x560 [ 735.073851] internal_create_group+0x282/0x970 [ 735.078464] sysfs_create_group+0x1f/0x30 [ 735.082651] lo_ioctl+0x1771/0x2190 [ 735.086301] ? lo_rw_aio_complete+0x430/0x430 [ 735.090813] blkdev_ioctl+0x9b6/0x2020 [ 735.094816] ? blkpg_ioctl+0xc40/0xc40 [ 735.098723] ? lock_downgrade+0x8e0/0x8e0 [ 735.102893] ? kasan_check_read+0x11/0x20 [ 735.107056] ? rcu_is_watching+0x85/0x140 [ 735.111221] ? rcu_report_qs_rnp+0x790/0x790 [ 735.115652] ? __fget+0x40c/0x650 [ 735.119122] ? expand_files.part.8+0x9a0/0x9a0 2018/06/05 09:47:56 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./control\x00', r2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000380)=0x102) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000400)={r4, 0x1}, &(0x7f0000000440)=0x8) r5 = msgget$private(0x0, 0xd0) msgctl$IPC_INFO(r5, 0x3, &(0x7f0000000480)) recvfrom(r1, &(0x7f00000000c0)=""/253, 0xfd, 0x1, &(0x7f00000001c0)=@nfc={0x27, 0x0, 0x0, 0x5}, 0x80) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') [ 735.123721] ? trace_hardirqs_off+0xd/0x10 [ 735.127974] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 735.133103] block_ioctl+0xee/0x130 [ 735.136745] ? blkdev_fallocate+0x400/0x400 [ 735.141079] do_vfs_ioctl+0x1cf/0x16f0 [ 735.144978] ? rcu_pm_notify+0xc0/0xc0 [ 735.148881] ? ioctl_preallocate+0x2e0/0x2e0 [ 735.153308] ? fget_raw+0x20/0x20 [ 735.156749] ? putname+0xf2/0x130 [ 735.160283] ? rcu_read_lock_sched_held+0x108/0x120 [ 735.165290] ? kmem_cache_free+0x25c/0x2d0 [ 735.169529] ? putname+0xf7/0x130 [ 735.172980] ? do_sys_open+0x3c3/0x740 [ 735.176871] ? security_file_ioctl+0x94/0xc0 [ 735.181273] ksys_ioctl+0xa9/0xd0 [ 735.184722] __x64_sys_ioctl+0x73/0xb0 [ 735.188600] do_syscall_64+0x1b1/0x800 [ 735.192479] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 735.197329] ? syscall_return_slowpath+0x5c0/0x5c0 [ 735.202249] ? syscall_return_slowpath+0x30f/0x5c0 [ 735.207175] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 735.212536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 735.217377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.222557] RIP: 0033:0x455877 [ 735.225731] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 735.245089] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 735.252792] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 735.260050] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 735.267306] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 2018/06/05 09:47:56 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00170c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000200002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 735.274564] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 735.281820] R13: 0000000000000001 R14: 0000000000700008 R15: 000000000000000d 2018/06/05 09:47:56 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x20000, 0x0) accept$ipx(r0, 0x0, &(0x7f00000001c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0/file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) fanotify_mark(r0, 0x1a, 0x10002, r0, &(0x7f0000000040)='./file0/file0\x00') perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000180)={0x9}, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf8000000]}, 0x10) 2018/06/05 09:47:56 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:56 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x8000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x1f, 0x8, 0x6}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x7, 0x4}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000180)={0x101}, 0xffffffffffffffa3) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:56 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:57 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a02090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 735.624955] FAULT_INJECTION: forcing a failure. [ 735.624955] name failslab, interval 1, probability 0, space 0, times 0 [ 735.636341] CPU: 0 PID: 20547 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 735.643276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.652650] Call Trace: [ 735.655264] dump_stack+0x1b9/0x294 [ 735.658922] ? dump_stack_print_info.cold.2+0x52/0x52 [ 735.664136] ? mutex_trylock+0x2a0/0x2a0 [ 735.668312] should_fail.cold.4+0xa/0x1a [ 735.672510] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 735.677629] ? __kernfs_new_node+0xe7/0x580 [ 735.681972] ? graph_lock+0x170/0x170 [ 735.685812] ? find_held_lock+0x36/0x1c0 [ 735.689888] ? find_held_lock+0x36/0x1c0 [ 735.693966] ? __lock_is_held+0xb5/0x140 [ 735.698054] ? check_same_owner+0x320/0x320 [ 735.702405] ? graph_lock+0x170/0x170 [ 735.706238] ? rcu_note_context_switch+0x710/0x710 [ 735.711179] ? kasan_check_write+0x14/0x20 [ 735.715427] __should_failslab+0x124/0x180 [ 735.719676] should_failslab+0x9/0x14 [ 735.723495] kmem_cache_alloc+0x2af/0x760 [ 735.727665] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 735.732695] __kernfs_new_node+0xe7/0x580 [ 735.736860] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 735.741632] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 735.747179] ? kernfs_link_sibling+0x1d2/0x3b0 [ 735.751783] ? kernfs_add_one+0x16f/0x620 [ 735.755948] ? kernfs_activate+0x2a0/0x2a0 [ 735.760288] kernfs_new_node+0x80/0xf0 [ 735.764197] __kernfs_create_file+0x4d/0x330 [ 735.768627] sysfs_add_file_mode_ns+0x21a/0x560 [ 735.773332] internal_create_group+0x282/0x970 [ 735.777939] sysfs_create_group+0x1f/0x30 [ 735.782098] lo_ioctl+0x1771/0x2190 [ 735.785780] ? lo_rw_aio_complete+0x430/0x430 [ 735.790294] blkdev_ioctl+0x9b6/0x2020 [ 735.794230] ? blkpg_ioctl+0xc40/0xc40 [ 735.798136] ? lock_downgrade+0x8e0/0x8e0 [ 735.802303] ? kasan_check_read+0x11/0x20 [ 735.806473] ? rcu_is_watching+0x85/0x140 [ 735.810626] ? rcu_report_qs_rnp+0x790/0x790 [ 735.815046] ? __fget+0x40c/0x650 [ 735.818518] ? expand_files.part.8+0x9a0/0x9a0 [ 735.823111] ? trace_hardirqs_off+0xd/0x10 [ 735.827352] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 735.832469] block_ioctl+0xee/0x130 [ 735.836083] ? blkdev_fallocate+0x400/0x400 [ 735.840400] do_vfs_ioctl+0x1cf/0x16f0 [ 735.844277] ? rcu_pm_notify+0xc0/0xc0 [ 735.848168] ? ioctl_preallocate+0x2e0/0x2e0 [ 735.852574] ? fget_raw+0x20/0x20 [ 735.856020] ? putname+0xf2/0x130 [ 735.859558] ? rcu_read_lock_sched_held+0x108/0x120 [ 735.864563] ? kmem_cache_free+0x25c/0x2d0 [ 735.868894] ? putname+0xf7/0x130 [ 735.872346] ? do_sys_open+0x3c3/0x740 [ 735.876244] ? security_file_ioctl+0x94/0xc0 [ 735.880659] ksys_ioctl+0xa9/0xd0 [ 735.884102] __x64_sys_ioctl+0x73/0xb0 [ 735.887977] do_syscall_64+0x1b1/0x800 [ 735.891851] ? finish_task_switch+0x1ca/0x840 [ 735.896336] ? syscall_return_slowpath+0x5c0/0x5c0 [ 735.901293] ? syscall_return_slowpath+0x30f/0x5c0 [ 735.906229] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 735.911584] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 735.916430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.921625] RIP: 0033:0x455877 [ 735.924801] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 735.943997] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 735.951708] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 735.958965] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 735.966242] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 2018/06/05 09:47:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000040002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x10000000000000, 0x1) connect$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:47:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, 0x10) 2018/06/05 09:47:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='ip6gre0\x00') rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:57 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:57 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:57 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a04090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 735.973511] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 735.980766] R13: 0000000000000001 R14: 0000000000700008 R15: 000000000000000e [ 736.112200] FAULT_INJECTION: forcing a failure. [ 736.112200] name failslab, interval 1, probability 0, space 0, times 0 [ 736.123699] CPU: 1 PID: 20594 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 736.130685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.140056] Call Trace: [ 736.142663] dump_stack+0x1b9/0x294 [ 736.146319] ? dump_stack_print_info.cold.2+0x52/0x52 [ 736.151531] ? perf_trace_lock_acquire+0xe3/0x980 [ 736.156399] ? mutex_trylock+0x2a0/0x2a0 2018/06/05 09:47:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) rename(&(0x7f0000000100)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}, 0x10) [ 736.160492] should_fail.cold.4+0xa/0x1a [ 736.164578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 736.169772] ? graph_lock+0x170/0x170 [ 736.173614] ? find_held_lock+0x36/0x1c0 [ 736.177703] ? __lock_is_held+0xb5/0x140 [ 736.181795] ? check_same_owner+0x320/0x320 [ 736.186154] ? graph_lock+0x170/0x170 [ 736.190001] ? rcu_note_context_switch+0x710/0x710 [ 736.195125] ? kasan_check_write+0x14/0x20 [ 736.199383] __should_failslab+0x124/0x180 [ 736.203646] should_failslab+0x9/0x14 [ 736.207470] kmem_cache_alloc+0x2af/0x760 2018/06/05 09:47:57 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 736.211651] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 736.216697] __kernfs_new_node+0xe7/0x580 [ 736.220871] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 736.225647] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 736.231211] ? kernfs_link_sibling+0x1d2/0x3b0 [ 736.235911] ? kernfs_add_one+0x16f/0x620 [ 736.240174] ? kernfs_activate+0x2a0/0x2a0 [ 736.244442] kernfs_new_node+0x80/0xf0 [ 736.248362] __kernfs_create_file+0x4d/0x330 [ 736.252813] sysfs_add_file_mode_ns+0x21a/0x560 [ 736.257520] internal_create_group+0x282/0x970 [ 736.262136] sysfs_create_group+0x1f/0x30 [ 736.266309] lo_ioctl+0x1771/0x2190 [ 736.269964] ? lo_rw_aio_complete+0x430/0x430 [ 736.274489] blkdev_ioctl+0x9b6/0x2020 [ 736.278421] ? blkpg_ioctl+0xc40/0xc40 [ 736.282308] ? lock_downgrade+0x8e0/0x8e0 [ 736.286476] ? kasan_check_read+0x11/0x20 [ 736.290618] ? rcu_is_watching+0x85/0x140 [ 736.294760] ? rcu_report_qs_rnp+0x790/0x790 [ 736.299169] ? __fget+0x40c/0x650 [ 736.302618] ? expand_files.part.8+0x9a0/0x9a0 [ 736.307192] ? trace_hardirqs_off+0xd/0x10 [ 736.311419] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 736.316517] block_ioctl+0xee/0x130 [ 736.320136] ? blkdev_fallocate+0x400/0x400 [ 736.324451] do_vfs_ioctl+0x1cf/0x16f0 [ 736.328329] ? rcu_pm_notify+0xc0/0xc0 [ 736.332213] ? ioctl_preallocate+0x2e0/0x2e0 [ 736.336615] ? fget_raw+0x20/0x20 [ 736.340059] ? putname+0xf2/0x130 [ 736.343503] ? rcu_read_lock_sched_held+0x108/0x120 [ 736.348511] ? kmem_cache_free+0x25c/0x2d0 [ 736.352739] ? putname+0xf7/0x130 [ 736.356194] ? do_sys_open+0x3c3/0x740 [ 736.360077] ? security_file_ioctl+0x94/0xc0 [ 736.364489] ksys_ioctl+0xa9/0xd0 [ 736.367937] __x64_sys_ioctl+0x73/0xb0 [ 736.371822] do_syscall_64+0x1b1/0x800 [ 736.375702] ? finish_task_switch+0x1ca/0x840 [ 736.380191] ? syscall_return_slowpath+0x5c0/0x5c0 [ 736.385113] ? syscall_return_slowpath+0x30f/0x5c0 [ 736.390053] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 736.395416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 736.400256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.405436] RIP: 0033:0x455877 [ 736.408612] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 736.427940] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 736.435645] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 736.442901] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 736.450160] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 2018/06/05 09:47:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000020002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:57 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00170c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 736.457510] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 736.464772] R13: 0000000000000001 R14: 0000000000700008 R15: 000000000000000f 2018/06/05 09:47:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000002002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f010000000000]}, 0x10) 2018/06/05 09:47:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:58 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000400)=0x9ee5, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="e287f977407ea021152068cd68eb8af2670a3bd6b16ecba3882ca18a7f7f3eef1180160c84fe3df36c08e0c076d10494b90c8e75d720ea296c7290879c22cb3cd86fac3bd67110366bccd04e3cae4ce1796ae1650dd7b5be21b9bce690d91635f142b80bbde2315c9b0c74d53665025a33b045c0edd047eba6f3f265cf515477d9f7e37f4ea3fb4ab5951c52ddd3030e2e5211d46cb986a0ce087fdcee35495722575315bfa726b98bd5", 0xaa}, {&(0x7f0000000180)="e4bf0c55c3400e59732515bde6080868782a93f6371b435ec527a4d020e106409d6e159c886f9abb01ed687d1d36b1dd210013a1448465b667951eb6ae5ed3a1eb2efe64ee6e75131dc19ad43e4d20ade5c8969904d96b96cbd5dc9403e263d58a2a6fc181a09d32740da9f1c11a8882ada27541b64516f0b68a9df47af6879c0201fe4e9af925cfec23532297f05b8a7a3463627516037fd829704e847b2b740e9609d8d2d1d14c9625fd58e3235d5b71fbb8f09a0788a7b77fde85e1a33e95d3058ee987b8a12ab36ff0a0b93c70a142ec884b30c19732c98bdbfb63f7a2a5da17dfe25c9b20f1ac0b881f62f837d84626957d99", 0xf5}, {&(0x7f0000000280)="602cad4b07593323553f11204b68e09bf1c9a2d5874cff9ce51945028178cbb33548417a73e93d125177d6fc3a6b8ea0344e631827d349e9194258f3878fd5fbe68d2fe3107d47602019b22c504285ae9e86aaa9c8e9094fe42e94dee3b64de0e0daac5126e859c8e7942e7c928a9fc22ffb65d9a5fa93521ecd3677021c72dd64fe688b003f75458cc56006a06718944e905128682fca1a441d5508d35b5d8492ea5729db3f73286ebf42f7a388fb2b40b45a143deee861376dd641ec60cc4912ca364713784bf1c647fcee20fbd5de3a15822266b2822dbe1412f49f", 0xdd}], 0x3) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000480)=0x1) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000440)=0x1, 0x4) 2018/06/05 09:47:58 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c040000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000200)='./file1\x00') modify_ldt$read(0x0, &(0x7f0000000240)=""/138, 0xffffffffffffff0f) 2018/06/05 09:47:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x10) 2018/06/05 09:47:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000017004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:58 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:58 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:58 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) [ 736.836814] QAT: Invalid ioctl [ 736.862457] FAULT_INJECTION: forcing a failure. [ 736.862457] name failslab, interval 1, probability 0, space 0, times 0 [ 736.873855] CPU: 0 PID: 20660 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 736.880794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.882245] QAT: Invalid ioctl [ 736.890169] Call Trace: [ 736.890208] dump_stack+0x1b9/0x294 [ 736.890228] ? dump_stack_print_info.cold.2+0x52/0x52 [ 736.890246] ? kasan_check_write+0x14/0x20 [ 736.890268] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 736.913964] should_fail.cold.4+0xa/0x1a [ 736.918034] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 736.923129] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 736.928058] ? graph_lock+0x170/0x170 [ 736.931858] ? find_held_lock+0x36/0x1c0 [ 736.935916] ? __lock_is_held+0xb5/0x140 [ 736.940069] ? check_same_owner+0x320/0x320 [ 736.944412] ? rcu_note_context_switch+0x710/0x710 [ 736.949339] __should_failslab+0x124/0x180 [ 736.953581] should_failslab+0x9/0x14 [ 736.957377] kmem_cache_alloc_trace+0x2cb/0x780 [ 736.962052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 736.967581] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 736.972436] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 736.977284] ? device_create_file+0x1e0/0x1e0 [ 736.981773] kobject_uevent_env+0x20f/0xea0 [ 736.986085] ? internal_create_group+0x347/0x970 [ 736.990839] kobject_uevent+0x1f/0x30 [ 736.994632] lo_ioctl+0x17ec/0x2190 [ 736.998254] ? lo_rw_aio_complete+0x430/0x430 [ 737.002747] blkdev_ioctl+0x9b6/0x2020 [ 737.006628] ? blkpg_ioctl+0xc40/0xc40 [ 737.010534] ? lock_downgrade+0x8e0/0x8e0 [ 737.014679] ? kasan_check_read+0x11/0x20 [ 737.018827] ? rcu_is_watching+0x85/0x140 [ 737.022962] ? rcu_report_qs_rnp+0x790/0x790 [ 737.027371] ? __fget+0x40c/0x650 [ 737.030822] ? expand_files.part.8+0x9a0/0x9a0 [ 737.035396] ? trace_hardirqs_off+0xd/0x10 [ 737.039636] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 737.044735] block_ioctl+0xee/0x130 [ 737.048351] ? blkdev_fallocate+0x400/0x400 [ 737.052665] do_vfs_ioctl+0x1cf/0x16f0 [ 737.056555] ? rcu_pm_notify+0xc0/0xc0 [ 737.060441] ? ioctl_preallocate+0x2e0/0x2e0 [ 737.064852] ? fget_raw+0x20/0x20 [ 737.068297] ? putname+0xf2/0x130 [ 737.071741] ? rcu_read_lock_sched_held+0x108/0x120 [ 737.076749] ? kmem_cache_free+0x25c/0x2d0 [ 737.080976] ? putname+0xf7/0x130 [ 737.084422] ? do_sys_open+0x3c3/0x740 [ 737.088304] ? security_file_ioctl+0x94/0xc0 [ 737.092709] ksys_ioctl+0xa9/0xd0 [ 737.096155] __x64_sys_ioctl+0x73/0xb0 [ 737.100042] do_syscall_64+0x1b1/0x800 [ 737.103922] ? finish_task_switch+0x1ca/0x840 [ 737.108410] ? syscall_return_slowpath+0x5c0/0x5c0 [ 737.113342] ? syscall_return_slowpath+0x30f/0x5c0 [ 737.118285] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 737.123904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.128744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.133929] RIP: 0033:0x455877 [ 737.137115] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.156450] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 737.164150] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 737.171433] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 737.178692] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 737.185950] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 737.193210] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000010 [ 737.227755] FAULT_INJECTION: forcing a failure. [ 737.227755] name failslab, interval 1, probability 0, space 0, times 0 [ 737.239140] CPU: 0 PID: 20667 Comm: syz-executor1 Not tainted 4.17.0+ #84 [ 737.246081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.255456] Call Trace: [ 737.258075] dump_stack+0x1b9/0x294 [ 737.261733] ? dump_stack_print_info.cold.2+0x52/0x52 [ 737.266972] ? perf_trace_lock_acquire+0xe3/0x980 [ 737.271850] should_fail.cold.4+0xa/0x1a [ 737.275948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 737.281187] ? lock_downgrade+0x8e0/0x8e0 [ 737.285365] ? proc_fail_nth_write+0x96/0x1f0 [ 737.289885] ? proc_cwd_link+0x1d0/0x1d0 [ 737.293994] ? find_held_lock+0x36/0x1c0 [ 737.298115] ? hash_ipportip_create+0xa60/0xb10 [ 737.302831] ? check_same_owner+0x320/0x320 [ 737.307192] ? rcu_note_context_switch+0x710/0x710 [ 737.312170] __should_failslab+0x124/0x180 [ 737.316436] should_failslab+0x9/0x14 [ 737.320267] __kmalloc+0x2c8/0x760 [ 737.323833] ? strncpy_from_user+0x500/0x500 [ 737.328280] ? fput+0x130/0x1a0 [ 737.331595] ? __x64_sys_memfd_create+0x139/0x5a0 [ 737.336484] __x64_sys_memfd_create+0x139/0x5a0 [ 737.341196] ? memfd_fcntl+0x15d0/0x15d0 [ 737.345289] ? do_syscall_64+0x92/0x800 [ 737.349302] do_syscall_64+0x1b1/0x800 [ 737.353317] ? finish_task_switch+0x1ca/0x840 [ 737.357834] ? syscall_return_slowpath+0x5c0/0x5c0 [ 737.362768] ? syscall_return_slowpath+0x30f/0x5c0 [ 737.367799] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 737.373166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.378029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.383214] RIP: 0033:0x455a09 [ 737.386390] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.405752] RSP: 002b:00007fced9663ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 737.413462] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 737.420727] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee 2018/06/05 09:47:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1c01000000000000]}, 0x10) 2018/06/05 09:47:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) io_setup(0xfffffffffffffffd, &(0x7f0000000040)) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:47:58 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c002000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000003004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 737.428090] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 737.435466] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 737.442737] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000000 2018/06/05 09:47:59 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x400000, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f0000000400)='./file0\x00', 0x9, 0x7, &(0x7f00000026c0)=[{&(0x7f0000000440)="6c0573", 0x3, 0x4}, {&(0x7f0000000480)="a253852b682860210d3655dbfb7df492f61691ee181f52bdec61dc98c38cfdfebd207427082d01ce9e69bc3da46611c594c4b3779c5c3a1f30bf12608f998e6cb1487c12f94d0424771ad6a9f6585b3e0e99c30339c39a698dd5d07e268923546d1c5f152517498db86e3f83a21671229e", 0x71, 0x401}, {&(0x7f0000000500)="babd40cdca2f4a9fc7c49cb8ad046316bfd367d1f7c9f0562be08b901808817df981aeaa715240bafa616910c5f3c8e1ed82c3ffa3b801d515eb1b28e53c52636077af72304287640f1b34b0343a4a1879a6bc626dd7f9ef9580635475404138170e6290424e024ceb6fc70a42701b1749806a62d56d9dbb0d357763f098116c18b92944d0d26b54a68d78f0e016e89b9a51ff6f4422b14b4fa4ab13c1f147b53cb3e7659a3f238d5cef36e9ac72708a22d9dfb4356962fc25ac75677d738d94ff6f5ca4bcfa6056e5ec1ba767777e3c85c8e6bbec1e2157097257516d7672e4b9127a32f1839cf369ad01f121", 0xed, 0x5585bb1f}, {&(0x7f0000000600)="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", 0x1000, 0x4800000000000000}, {&(0x7f0000001600)="eef9121cb19aa20a082a73bd9596eec241e328647c988301dbae1941bc12f51db7c137cae5166a731cd1e7626dc10aeb3ad5f0d25e09d934cf4a5ffafa774fa10ffe06ab46fd89e640a164043363a54c21f3f99633730143154c95f576ed7a49499976758c0bfd698ddd7a597cf5028318b8ece9e9ed4e9fe410f52406f3ff", 0x7f, 0x6}, {&(0x7f0000001680)="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", 0x1000, 0x800}, {&(0x7f0000002680), 0x0, 0xc63c}], 0x2020000, &(0x7f0000002780)={[{@treelog='treelog', 0x2c}, {@fragment_metadata='fragment=metadata', 0x2c}, {@nodatasum='nodatasum', 0x2c}, {@space_cache='space_cache', 0x2c}, {@nossd='nossd', 0x2c}, {@device={'device', 0x3d, './file0'}, 0x2c}, {@user_subvol_rm='user_subvol_rm_allowed', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@space_cache='space_cache', 0x2c}, {@autodefrag='autodefrag', 0x2c}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./control\x00', 0x10000, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000280)) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') llistxattr(&(0x7f0000000040)='./control\x00', &(0x7f00000000c0)=""/75, 0x4b) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./control\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002800)={&(0x7f0000002680)='./control/file0\x00', r2}, 0x10) openat$cgroup_int(r1, &(0x7f0000000140)='io.max\x00', 0x2, 0x0) fcntl$getown(r1, 0x9) mknod(&(0x7f0000000200)='./file0\x00', 0xe188, 0x4) socket$bt_hidp(0x1f, 0x3, 0x6) 2018/06/05 09:47:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf003000000000000]}, 0x10) 2018/06/05 09:47:59 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:59 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:59 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c020000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000202004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:47:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000100)='./control\x00', &(0x7f0000000180)='./control\x00') 2018/06/05 09:47:59 executing program 3: mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000180)={0xc, 0x18be71a3bace196a}) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000001c0)=0x8) 2018/06/05 09:47:59 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:47:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x10) [ 737.759643] FAULT_INJECTION: forcing a failure. [ 737.759643] name failslab, interval 1, probability 0, space 0, times 0 [ 737.770985] CPU: 0 PID: 20727 Comm: syz-executor1 Not tainted 4.17.0+ #84 [ 737.777931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.787301] Call Trace: [ 737.789919] dump_stack+0x1b9/0x294 [ 737.793575] ? dump_stack_print_info.cold.2+0x52/0x52 [ 737.798801] should_fail.cold.4+0xa/0x1a [ 737.802891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 737.808037] ? find_held_lock+0x36/0x1c0 [ 737.812144] ? check_same_owner+0x320/0x320 [ 737.816503] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 737.821550] ? rcu_note_context_switch+0x710/0x710 [ 737.826510] __should_failslab+0x124/0x180 [ 737.830782] should_failslab+0x9/0x14 [ 737.834593] kmem_cache_alloc+0x2af/0x760 [ 737.838750] ? lock_downgrade+0x8e0/0x8e0 [ 737.842993] __d_alloc+0xc0/0xd30 [ 737.846472] ? do_raw_spin_unlock+0x9e/0x2e0 [ 737.850880] ? shrink_dcache_for_umount+0x290/0x290 [ 737.855891] ? __lock_is_held+0xb5/0x140 [ 737.859952] ? _raw_spin_unlock+0x22/0x30 [ 737.864095] ? __alloc_fd+0x346/0x700 [ 737.867905] ? exit_files+0xb0/0xb0 [ 737.871524] ? lock_downgrade+0x8e0/0x8e0 [ 737.875681] d_alloc_pseudo+0x1d/0x30 [ 737.879479] __shmem_file_setup+0x1ed/0x6e0 [ 737.883794] ? shmem_fill_super+0xa30/0xa30 [ 737.888132] ? get_unused_fd_flags+0x121/0x190 [ 737.892709] ? __alloc_fd+0x700/0x700 [ 737.896506] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 737.902049] ? _copy_from_user+0xdf/0x150 [ 737.906213] __x64_sys_memfd_create+0x2a7/0x5a0 [ 737.910883] ? memfd_fcntl+0x15d0/0x15d0 [ 737.914938] ? do_syscall_64+0x92/0x800 [ 737.918909] do_syscall_64+0x1b1/0x800 [ 737.922791] ? syscall_return_slowpath+0x5c0/0x5c0 [ 737.927716] ? syscall_return_slowpath+0x30f/0x5c0 [ 737.932644] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 737.938009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.942857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.948040] RIP: 0033:0x455a09 [ 737.951255] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.971453] RSP: 002b:00007fced9663ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 737.979155] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 737.986426] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 737.993685] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 738.000945] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 2018/06/05 09:47:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3ec]}, 0x10) 2018/06/05 09:47:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000402004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 738.008225] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000001 [ 738.039984] FAULT_INJECTION: forcing a failure. [ 738.039984] name failslab, interval 1, probability 0, space 0, times 0 [ 738.051406] CPU: 0 PID: 20733 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 738.058361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.067759] Call Trace: [ 738.070381] dump_stack+0x1b9/0x294 [ 738.074060] ? dump_stack_print_info.cold.2+0x52/0x52 [ 738.079282] ? perf_trace_lock_acquire+0xe3/0x980 [ 738.084169] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 738.089142] should_fail.cold.4+0xa/0x1a [ 738.093241] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 738.098378] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 738.103355] ? graph_lock+0x170/0x170 [ 738.107215] ? find_held_lock+0x36/0x1c0 [ 738.111313] ? __lock_is_held+0xb5/0x140 [ 738.115419] ? check_same_owner+0x320/0x320 [ 738.119769] ? rcu_note_context_switch+0x710/0x710 [ 738.124727] __should_failslab+0x124/0x180 [ 738.128996] should_failslab+0x9/0x14 [ 738.132819] kmem_cache_alloc_trace+0x2cb/0x780 [ 738.137515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.143079] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 738.148746] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 738.153616] ? device_create_file+0x1e0/0x1e0 [ 738.158145] kobject_uevent_env+0x20f/0xea0 [ 738.162497] ? internal_create_group+0x347/0x970 [ 738.167294] kobject_uevent+0x1f/0x30 [ 738.171094] lo_ioctl+0x17ec/0x2190 [ 738.174856] ? lo_rw_aio_complete+0x430/0x430 [ 738.179348] blkdev_ioctl+0x9b6/0x2020 [ 738.183232] ? blkpg_ioctl+0xc40/0xc40 [ 738.187117] ? lock_downgrade+0x8e0/0x8e0 [ 738.191267] ? kasan_check_read+0x11/0x20 [ 738.195439] ? rcu_is_watching+0x85/0x140 [ 738.199580] ? rcu_report_qs_rnp+0x790/0x790 [ 738.203992] ? __fget+0x40c/0x650 [ 738.207451] ? expand_files.part.8+0x9a0/0x9a0 [ 738.212052] ? trace_hardirqs_off+0xd/0x10 [ 738.216282] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 738.221383] block_ioctl+0xee/0x130 [ 738.225018] ? blkdev_fallocate+0x400/0x400 [ 738.229346] do_vfs_ioctl+0x1cf/0x16f0 [ 738.233233] ? rcu_pm_notify+0xc0/0xc0 [ 738.237115] ? ioctl_preallocate+0x2e0/0x2e0 [ 738.241517] ? fget_raw+0x20/0x20 [ 738.245059] ? putname+0xf2/0x130 [ 738.248684] ? rcu_read_lock_sched_held+0x108/0x120 [ 738.253694] ? kmem_cache_free+0x25c/0x2d0 [ 738.257934] ? putname+0xf7/0x130 [ 738.261393] ? do_sys_open+0x3c3/0x740 [ 738.265277] ? security_file_ioctl+0x94/0xc0 [ 738.269697] ksys_ioctl+0xa9/0xd0 [ 738.273149] __x64_sys_ioctl+0x73/0xb0 [ 738.277034] do_syscall_64+0x1b1/0x800 [ 738.280917] ? finish_task_switch+0x1ca/0x840 [ 738.285404] ? syscall_return_slowpath+0x5c0/0x5c0 [ 738.290332] ? syscall_return_slowpath+0x30f/0x5c0 [ 738.295260] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 738.300628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.305469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.310646] RIP: 0033:0x455877 [ 738.313820] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.333252] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 2018/06/05 09:47:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f0000000140)='./control\x00', 0x400, 0x5) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100000001, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r1, 0x50, &(0x7f0000000180)}, 0x10) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) 2018/06/05 09:47:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x10) 2018/06/05 09:47:59 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000400ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 738.340959] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 738.348226] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 738.355483] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 738.362745] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 738.370007] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000011 2018/06/05 09:48:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000000a004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:00 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:00 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:00 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) fcntl$getown(r0, 0x9) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') chdir(&(0x7f0000000040)='./file0\x00') 2018/06/05 09:48:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x2802) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000180)={0x3ff, 0x0, {0x3, 0x3, 0x8, 0x0, 0xffffffff80000000}}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000380)={0x3ff, 0xffffffff, 0x4}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xfffffffffffffed3) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x100, 0x12000) getpeername$unix(r1, &(0x7f00000002c0), &(0x7f0000000240)=0x6e) 2018/06/05 09:48:00 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000200ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x10) 2018/06/05 09:48:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) socketpair(0x5, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 2018/06/05 09:48:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000002b004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 738.714674] FAULT_INJECTION: forcing a failure. [ 738.714674] name failslab, interval 1, probability 0, space 0, times 0 [ 738.726237] CPU: 1 PID: 20773 Comm: syz-executor1 Not tainted 4.17.0+ #84 [ 738.733180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.742937] Call Trace: [ 738.745548] dump_stack+0x1b9/0x294 [ 738.747288] FAULT_INJECTION: forcing a failure. [ 738.747288] name failslab, interval 1, probability 0, space 0, times 0 [ 738.749195] ? dump_stack_print_info.cold.2+0x52/0x52 [ 738.749217] ? __kernel_text_address+0xd/0x40 [ 738.749238] ? unwind_get_return_address+0x61/0xa0 [ 738.749256] should_fail.cold.4+0xa/0x1a [ 738.749279] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 738.784303] ? save_stack+0xa9/0xd0 [ 738.787932] ? save_stack+0x43/0xd0 [ 738.791556] ? kasan_kmalloc+0xc4/0xe0 [ 738.795446] ? kasan_slab_alloc+0x12/0x20 [ 738.799590] ? kmem_cache_alloc+0x12e/0x760 [ 738.803908] ? __d_alloc+0xc0/0xd30 [ 738.807528] ? d_alloc_pseudo+0x1d/0x30 [ 738.811499] ? __shmem_file_setup+0x1ed/0x6e0 [ 738.815988] ? __x64_sys_memfd_create+0x2a7/0x5a0 [ 738.820826] ? do_syscall_64+0x1b1/0x800 [ 738.824887] ? find_held_lock+0x36/0x1c0 [ 738.828960] ? check_same_owner+0x320/0x320 [ 738.833280] ? rcu_note_context_switch+0x710/0x710 [ 738.838204] ? kasan_check_read+0x11/0x20 [ 738.842347] ? rcu_is_watching+0x85/0x140 [ 738.846590] __should_failslab+0x124/0x180 [ 738.850826] should_failslab+0x9/0x14 [ 738.854621] kmem_cache_alloc+0x2af/0x760 [ 738.859738] ? __raw_spin_lock_init+0x1c/0x100 [ 738.864329] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 738.869360] ? shmem_destroy_callback+0xc0/0xc0 [ 738.874025] shmem_alloc_inode+0x1b/0x40 [ 738.878088] alloc_inode+0x63/0x190 [ 738.881718] new_inode_pseudo+0x69/0x1a0 [ 738.885792] ? prune_icache_sb+0x1a0/0x1a0 [ 738.890027] ? shrink_dcache_for_umount+0x290/0x290 [ 738.895046] new_inode+0x1c/0x40 [ 738.898414] shmem_get_inode+0xe5/0x8f0 [ 738.902394] ? shmem_encode_fh+0x340/0x340 [ 738.906728] ? exit_files+0xb0/0xb0 [ 738.910356] ? lock_downgrade+0x8e0/0x8e0 [ 738.914505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.920037] ? d_set_d_op+0x31d/0x410 [ 738.923837] __shmem_file_setup+0x249/0x6e0 [ 738.928159] ? shmem_fill_super+0xa30/0xa30 [ 738.932485] ? get_unused_fd_flags+0x121/0x190 [ 738.937069] ? __alloc_fd+0x700/0x700 [ 738.940875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.946414] ? _copy_from_user+0xdf/0x150 [ 738.950564] __x64_sys_memfd_create+0x2a7/0x5a0 [ 738.955233] ? memfd_fcntl+0x15d0/0x15d0 [ 738.959294] ? do_syscall_64+0x92/0x800 [ 738.963284] do_syscall_64+0x1b1/0x800 [ 738.967182] ? finish_task_switch+0x1ca/0x840 [ 738.971676] ? syscall_return_slowpath+0x5c0/0x5c0 [ 738.976612] ? syscall_return_slowpath+0x30f/0x5c0 [ 738.981549] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 738.986915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.991763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.996952] RIP: 0033:0x455a09 [ 739.000132] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.019458] RSP: 002b:00007fced9663ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 739.027172] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 739.034451] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 739.041720] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 739.048988] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 739.056256] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000002 [ 739.063546] CPU: 0 PID: 20789 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 739.070538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.079905] Call Trace: [ 739.082515] dump_stack+0x1b9/0x294 [ 739.086160] ? dump_stack_print_info.cold.2+0x52/0x52 [ 739.091374] ? kernel_text_address+0x79/0xf0 [ 739.095804] ? __unwind_start+0x166/0x330 [ 739.099966] ? __kernel_text_address+0xd/0x40 [ 739.104566] should_fail.cold.4+0xa/0x1a [ 739.108678] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 739.113815] ? save_stack+0xa9/0xd0 [ 739.117465] ? graph_lock+0x170/0x170 [ 739.121281] ? kasan_kmalloc+0xc4/0xe0 [ 739.125183] ? kmem_cache_alloc_trace+0x152/0x780 [ 739.130041] ? kobject_uevent_env+0x20f/0xea0 [ 739.134553] ? kobject_uevent+0x1f/0x30 [ 739.138542] ? lo_ioctl+0x17ec/0x2190 [ 739.142381] ? blkdev_ioctl+0x9b6/0x2020 [ 739.146460] ? find_held_lock+0x36/0x1c0 [ 739.150543] ? __lock_is_held+0xb5/0x140 [ 739.154634] ? check_same_owner+0x320/0x320 [ 739.158975] ? rcu_note_context_switch+0x710/0x710 2018/06/05 09:48:00 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x10) [ 739.163926] __should_failslab+0x124/0x180 [ 739.168182] should_failslab+0x9/0x14 [ 739.172008] __kmalloc+0x2c8/0x760 [ 739.175573] ? kobject_uevent_env+0x20f/0xea0 [ 739.180082] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.185122] ? kobject_get_path+0xc2/0x1a0 [ 739.189382] kobject_get_path+0xc2/0x1a0 [ 739.193451] kobject_uevent_env+0x234/0xea0 [ 739.197775] ? internal_create_group+0x347/0x970 [ 739.202556] kobject_uevent+0x1f/0x30 [ 739.206359] lo_ioctl+0x17ec/0x2190 [ 739.209985] ? lo_rw_aio_complete+0x430/0x430 [ 739.215011] blkdev_ioctl+0x9b6/0x2020 [ 739.218988] ? blkpg_ioctl+0xc40/0xc40 [ 739.222882] ? lock_downgrade+0x8e0/0x8e0 [ 739.227047] ? kasan_check_read+0x11/0x20 [ 739.231716] ? rcu_is_watching+0x85/0x140 [ 739.235867] ? rcu_report_qs_rnp+0x790/0x790 [ 739.240627] ? __fget+0x40c/0x650 [ 739.244083] ? expand_files.part.8+0x9a0/0x9a0 [ 739.248656] ? trace_hardirqs_off+0xd/0x10 [ 739.252883] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 739.257981] block_ioctl+0xee/0x130 [ 739.261601] ? blkdev_fallocate+0x400/0x400 [ 739.265917] do_vfs_ioctl+0x1cf/0x16f0 [ 739.269795] ? rcu_pm_notify+0xc0/0xc0 [ 739.273676] ? ioctl_preallocate+0x2e0/0x2e0 [ 739.278088] ? fget_raw+0x20/0x20 [ 739.281528] ? putname+0xf2/0x130 [ 739.284971] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.289977] ? kmem_cache_free+0x25c/0x2d0 [ 739.294208] ? putname+0xf7/0x130 [ 739.297659] ? do_sys_open+0x3c3/0x740 [ 739.301541] ? security_file_ioctl+0x94/0xc0 [ 739.305942] ksys_ioctl+0xa9/0xd0 [ 739.309389] __x64_sys_ioctl+0x73/0xb0 [ 739.313271] do_syscall_64+0x1b1/0x800 [ 739.317255] ? syscall_return_slowpath+0x5c0/0x5c0 [ 739.322179] ? syscall_return_slowpath+0x30f/0x5c0 [ 739.327110] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 739.332470] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.337339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.342533] RIP: 0033:0x455877 [ 739.345736] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 2018/06/05 09:48:00 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000020ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 739.365792] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 739.373586] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 739.380844] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 739.388103] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 739.395364] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 739.402633] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000012 2018/06/05 09:48:00 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:01 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./control\x00', 0x1, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000400)="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", 0x1000, 0x6}, {&(0x7f0000000100)="306d75fee3acc524764ec50e1e40ffbb28a12ee4bcb00b18d9df84675343f31c962d", 0x22}, {&(0x7f0000000140)="cba6aa32e51be338215940345db8aa1d716be5bcc9abdcf10ac4dd703cee4df1d3c21059cf0af25a3435622b06a6c471983e38e491ee2806e80b75b4c1ffd212b2e1da0605cb6377e78cb4ac071d297e2d7c660e503fed9176c31a62eaac5930a60aa5a757", 0x65, 0xd6f}, {&(0x7f00000001c0)="3958e1a8e2b82be06c10163a323e139a81a1f2e3f2a94fbae970d89bdbb74a64c3fd8ce31cdecb81c8072683c0ce0b5fe2973cfbcb5b19915e4122745c4852554f620a93848c22ee7f7ad85576e188b92a09d0c928ca05159844063c07f29b9056d661adcde9ad95e84651ba8f0284ac6e31b4799e5f8f3117aac35c0ddca20d567f8eb755a18916280591e72bea2ee007fa48e9a6fc7ec31561c553d79b9e364f0b8df52685cdc5424aae330f641e672cb71485640986469fd3a1a126214e796d959042e49d0410a4d2417ed12e1eec26dc4683b35439c350b92039e8f0d62fd4d4", 0xe2, 0x6}], 0x2000, &(0x7f0000000340)={[{@gid={'gid', 0x3d, [0x30, 0x34, 0x31, 0x35, 0x37, 0x37]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x33, 0x37, 0x35, 0x32]}, 0x2c}, {@codepage={'codepage', 0x3d, '869'}, 0x2c}, {@check_relaxed='check=relaxed', 0x2c}]}) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') syz_mount_image$gfs2(&(0x7f0000001400)='gfs2\x00', &(0x7f0000001440)='./control\x00', 0x896, 0x2, &(0x7f0000001600)=[{&(0x7f0000001480)="eec96cf804afacfd6a76c0a06cdcbecf13952f4c1ef252eca6c6e5bbc225b7bd9ba1278553e1bfa4f0478f9a89ad559fb476cbceafe7b98aa0a5ee17f92e2df28f4cdee00f0620727893a3de6c6df0dd546305e39b656696d3a4c68d14e28168d04116a009ce139de3e4555102dd04cbcc7370638ede2a04ffbbcaea06982de0e7e787a4b126a8949f7a7fd12d0518fbcaaadf7ec41045115224d8e3e57f839e6e4bf5b86517bb941ef78b11a202839d1e5bea0e1d04701eeb60f00677de8f", 0xbf, 0xea0a}, {&(0x7f0000001540)="acfa802500c9b645fd3fa112f55bf8a33cbeda173c28eb02b053444db84b7c81c77387d02f9de12935743f40b76793e62594c9b6ed7d9f141acab8bd83a972595a30f83ccf69909889a523426873aa894d939f6ceea5c5f59655fe587ed4ea29a29140d45383f8e010fd6fd8a93121af84cb1cbc782dcf770aecad576811c25a6acdb81c0fc772f9cc54d07b9f5df7d325618d8b0255372e0ef2086848d4984a4c42261d45fa2b2c2c4ef2421724922c9a39f7db1905095d", 0xb8, 0xffffffffffff996c}], 0x60, &(0x7f0000001640)={[{@discard='discard', 0x2c}]}) 2018/06/05 09:48:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000003f004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:01 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:01 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 739.649734] FAULT_INJECTION: forcing a failure. [ 739.649734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 739.661617] CPU: 1 PID: 20827 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 739.668560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.677958] Call Trace: [ 739.680585] dump_stack+0x1b9/0x294 [ 739.684245] ? dump_stack_print_info.cold.2+0x52/0x52 [ 739.689476] should_fail.cold.4+0xa/0x1a [ 739.693568] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 739.698715] ? debug_check_no_locks_freed+0x310/0x310 [ 739.703935] ? lock_downgrade+0x8e0/0x8e0 [ 739.706558] FAULT_INJECTION: forcing a failure. [ 739.706558] name failslab, interval 1, probability 0, space 0, times 0 [ 739.708126] ? find_held_lock+0x36/0x1c0 [ 739.708156] ? radix_tree_iter_replace+0x4c/0x60 [ 739.708174] ? perf_trace_lock_acquire+0xe3/0x980 [ 739.708201] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 739.738049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.743587] ? should_fail+0x21b/0xbcd [ 739.747472] ? graph_lock+0x170/0x170 [ 739.751295] ? lock_downgrade+0x8e0/0x8e0 [ 739.755449] __alloc_pages_nodemask+0x34e/0xd70 [ 739.760123] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 739.765144] ? find_held_lock+0x36/0x1c0 [ 739.769470] ? __lock_is_held+0xb5/0x140 [ 739.774500] ? check_same_owner+0x320/0x320 [ 739.778826] cache_grow_begin+0x6e/0x6c0 [ 739.782896] kmem_cache_alloc_trace+0x6a5/0x780 [ 739.787567] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.793108] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 739.797956] ? device_create_file+0x1e0/0x1e0 [ 739.802455] kobject_uevent_env+0x20f/0xea0 [ 739.806788] ? internal_create_group+0x347/0x970 [ 739.811554] kobject_uevent+0x1f/0x30 [ 739.815354] lo_ioctl+0x17ec/0x2190 [ 739.818985] ? lo_rw_aio_complete+0x430/0x430 [ 739.823480] blkdev_ioctl+0x9b6/0x2020 [ 739.827380] ? blkpg_ioctl+0xc40/0xc40 [ 739.831267] ? lock_downgrade+0x8e0/0x8e0 [ 739.835421] ? kasan_check_read+0x11/0x20 [ 739.839565] ? rcu_is_watching+0x85/0x140 [ 739.843727] ? rcu_report_qs_rnp+0x790/0x790 [ 739.848142] ? __fget+0x40c/0x650 [ 739.851598] ? expand_files.part.8+0x9a0/0x9a0 [ 739.856182] ? trace_hardirqs_off+0xd/0x10 [ 739.860418] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 739.865525] block_ioctl+0xee/0x130 [ 739.869150] ? blkdev_fallocate+0x400/0x400 [ 739.873469] do_vfs_ioctl+0x1cf/0x16f0 [ 739.877352] ? rcu_pm_notify+0xc0/0xc0 [ 739.881261] ? ioctl_preallocate+0x2e0/0x2e0 [ 739.885674] ? fget_raw+0x20/0x20 [ 739.889123] ? putname+0xf2/0x130 [ 739.892574] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.897587] ? kmem_cache_free+0x25c/0x2d0 [ 739.901823] ? putname+0xf7/0x130 [ 739.905288] ? do_sys_open+0x3c3/0x740 [ 739.909179] ? security_file_ioctl+0x94/0xc0 [ 739.913588] ksys_ioctl+0xa9/0xd0 [ 739.917045] __x64_sys_ioctl+0x73/0xb0 [ 739.920934] do_syscall_64+0x1b1/0x800 [ 739.924821] ? finish_task_switch+0x1ca/0x840 [ 739.929319] ? syscall_return_slowpath+0x5c0/0x5c0 [ 739.934248] ? syscall_return_slowpath+0x30f/0x5c0 [ 739.939187] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 739.944554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.949407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.954595] RIP: 0033:0x455877 [ 739.957775] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.977468] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 739.985188] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 739.992462] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 740.000334] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 740.007597] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 740.014862] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000013 [ 740.022155] CPU: 0 PID: 20829 Comm: syz-executor1 Not tainted 4.17.0+ #84 [ 740.029108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.038476] Call Trace: [ 740.041086] dump_stack+0x1b9/0x294 [ 740.044749] ? dump_stack_print_info.cold.2+0x52/0x52 [ 740.049960] ? perf_trace_lock_acquire+0xe3/0x980 [ 740.054825] ? graph_lock+0x170/0x170 [ 740.058650] should_fail.cold.4+0xa/0x1a [ 740.062734] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 740.067859] ? find_held_lock+0x36/0x1c0 [ 740.072028] ? graph_lock+0x170/0x170 [ 740.075862] ? find_held_lock+0x36/0x1c0 [ 740.080015] ? check_same_owner+0x320/0x320 [ 740.084358] ? graph_lock+0x170/0x170 [ 740.088186] ? rcu_note_context_switch+0x710/0x710 [ 740.093190] ? kasan_check_read+0x11/0x20 [ 740.097358] ? do_raw_spin_unlock+0x9e/0x2e0 [ 740.101787] __should_failslab+0x124/0x180 [ 740.106050] should_failslab+0x9/0x14 [ 740.109878] kmem_cache_alloc+0x2af/0x760 [ 740.114047] ? find_held_lock+0x36/0x1c0 [ 740.118139] get_empty_filp+0x125/0x520 [ 740.122135] ? proc_nr_files+0x60/0x60 [ 740.126047] ? kasan_check_read+0x11/0x20 [ 740.130225] ? do_raw_spin_unlock+0x9e/0x2e0 [ 740.134628] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 740.139213] ? kasan_check_write+0x14/0x20 [ 740.143439] ? do_raw_spin_lock+0xc1/0x200 [ 740.147666] alloc_file+0x24/0x3e0 [ 740.151196] ? clear_nlink.part.9+0x65/0x80 [ 740.155514] __shmem_file_setup+0x304/0x6e0 [ 740.159828] ? shmem_fill_super+0xa30/0xa30 [ 740.164148] ? get_unused_fd_flags+0x121/0x190 [ 740.168733] ? __alloc_fd+0x700/0x700 [ 740.172620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 740.178160] ? _copy_from_user+0xdf/0x150 [ 740.182304] __x64_sys_memfd_create+0x2a7/0x5a0 [ 740.186965] ? memfd_fcntl+0x15d0/0x15d0 [ 740.191023] ? do_syscall_64+0x92/0x800 [ 740.194994] do_syscall_64+0x1b1/0x800 [ 740.198875] ? finish_task_switch+0x1ca/0x840 [ 740.203364] ? syscall_return_slowpath+0x5c0/0x5c0 [ 740.208373] ? syscall_return_slowpath+0x30f/0x5c0 [ 740.213317] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 740.218677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 740.223524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.228701] RIP: 0033:0x455a09 [ 740.231870] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.251217] RSP: 002b:00007fced9663ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 740.258919] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 740.266192] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 740.273450] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 740.280709] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 740.287971] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000003 2018/06/05 09:48:01 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000002ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03]}, 0x10) 2018/06/05 09:48:01 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) connect$nfc_raw(r0, &(0x7f00000000c0)={0x27, 0x0, 0x1, 0x7}, 0xffffffffffffff36) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffff9c) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000080)=0x20, &(0x7f0000000240)=0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) mq_notify(r0, &(0x7f0000000180)={0x0, 0x3, 0x2, @tid=r1}) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000100)=0x49) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400, 0x0) rename(&(0x7f0000000380)='./file0/*ile1\x00', &(0x7f0000000300)='./file0\x00') 2018/06/05 09:48:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000004004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:01 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:01 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:01 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 740.391178] Unknown ioctl 44672 [ 740.409260] Unknown ioctl 44672 [ 740.495929] FAULT_INJECTION: forcing a failure. [ 740.495929] name failslab, interval 1, probability 0, space 0, times 0 [ 740.507952] CPU: 0 PID: 20856 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 740.512742] FAULT_INJECTION: forcing a failure. [ 740.512742] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.514892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.536136] Call Trace: [ 740.538742] dump_stack+0x1b9/0x294 [ 740.542369] ? dump_stack_print_info.cold.2+0x52/0x52 [ 740.547558] ? perf_trace_lock_acquire+0xe3/0x980 [ 740.552397] ? kernel_text_address+0x79/0xf0 [ 740.556800] ? __unwind_start+0x166/0x330 [ 740.560948] should_fail.cold.4+0xa/0x1a [ 740.565008] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 740.570117] ? graph_lock+0x170/0x170 [ 740.573918] ? save_stack+0x43/0xd0 [ 740.577545] ? kasan_slab_alloc+0x12/0x20 [ 740.581696] ? find_held_lock+0x36/0x1c0 [ 740.585759] ? __lock_is_held+0xb5/0x140 [ 740.589830] ? check_same_owner+0x320/0x320 [ 740.594157] ? rcu_note_context_switch+0x710/0x710 [ 740.599090] __should_failslab+0x124/0x180 [ 740.603328] should_failslab+0x9/0x14 [ 740.607131] kmem_cache_alloc_node_trace+0x26f/0x770 [ 740.612248] __kmalloc_node_track_caller+0x33/0x70 [ 740.617182] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 740.621938] __alloc_skb+0x14d/0x780 [ 740.625657] ? skb_scrub_packet+0x580/0x580 [ 740.629984] ? rcu_report_qs_rnp+0x790/0x790 [ 740.634401] ? netlink_has_listeners+0x2ff/0x4c0 [ 740.639943] ? netlink_tap_init_net+0x3c0/0x3c0 [ 740.644637] kobject_uevent_env+0x801/0xea0 [ 740.648956] ? internal_create_group+0x347/0x970 [ 740.653719] kobject_uevent+0x1f/0x30 [ 740.657518] lo_ioctl+0x17ec/0x2190 [ 740.661153] ? lo_rw_aio_complete+0x430/0x430 [ 740.665648] blkdev_ioctl+0x9b6/0x2020 [ 740.669534] ? blkpg_ioctl+0xc40/0xc40 [ 740.673420] ? lock_downgrade+0x8e0/0x8e0 [ 740.677572] ? kasan_check_read+0x11/0x20 [ 740.681719] ? rcu_is_watching+0x85/0x140 [ 740.685866] ? rcu_report_qs_rnp+0x790/0x790 [ 740.690285] ? __fget+0x40c/0x650 [ 740.693740] ? expand_files.part.8+0x9a0/0x9a0 [ 740.698323] ? trace_hardirqs_off+0xd/0x10 [ 740.702557] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 740.707662] block_ioctl+0xee/0x130 [ 740.711289] ? blkdev_fallocate+0x400/0x400 [ 740.715608] do_vfs_ioctl+0x1cf/0x16f0 [ 740.719492] ? rcu_pm_notify+0xc0/0xc0 [ 740.723384] ? ioctl_preallocate+0x2e0/0x2e0 [ 740.727789] ? fget_raw+0x20/0x20 [ 740.731235] ? putname+0xf2/0x130 [ 740.734684] ? rcu_read_lock_sched_held+0x108/0x120 [ 740.739697] ? kmem_cache_free+0x25c/0x2d0 [ 740.743928] ? putname+0xf7/0x130 [ 740.747381] ? do_sys_open+0x3c3/0x740 [ 740.751277] ? security_file_ioctl+0x94/0xc0 [ 740.755861] ksys_ioctl+0xa9/0xd0 [ 740.759318] __x64_sys_ioctl+0x73/0xb0 [ 740.763205] do_syscall_64+0x1b1/0x800 [ 740.767091] ? finish_task_switch+0x1ca/0x840 [ 740.771587] ? syscall_return_slowpath+0x5c0/0x5c0 [ 740.776534] ? syscall_return_slowpath+0x30f/0x5c0 [ 740.781474] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 740.786843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 740.791690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.796963] RIP: 0033:0x455877 [ 740.800149] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.819868] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 740.827578] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455877 [ 740.834849] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 740.842114] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 740.849392] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 740.856695] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000014 [ 740.863984] CPU: 1 PID: 20873 Comm: syz-executor1 Not tainted 4.17.0+ #84 [ 740.871198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.880551] Call Trace: [ 740.883139] dump_stack+0x1b9/0x294 [ 740.886761] ? dump_stack_print_info.cold.2+0x52/0x52 [ 740.891942] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 740.896970] should_fail.cold.4+0xa/0x1a [ 740.901031] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 740.906134] ? graph_lock+0x170/0x170 [ 740.909940] ? find_held_lock+0x36/0x1c0 [ 740.914601] ? __lock_is_held+0xb5/0x140 [ 740.918686] ? check_same_owner+0x320/0x320 [ 740.923001] ? rcu_note_context_switch+0x710/0x710 [ 740.927929] ? __might_sleep+0x95/0x190 [ 740.931897] __alloc_pages_nodemask+0x34e/0xd70 [ 740.936570] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 740.941581] ? debug_check_no_locks_freed+0x310/0x310 [ 740.946772] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 740.951781] ? percpu_counter_add_batch+0xf2/0x150 [ 740.956719] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 740.962259] alloc_pages_vma+0xdd/0x540 [ 740.966244] shmem_alloc_page+0x178/0x2c0 [ 740.970399] ? shmem_swapin+0x3a0/0x3a0 [ 740.974368] ? find_lock_entry+0x2db/0x8a0 [ 740.978616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.984166] ? security_vm_enough_memory_mm+0x9d/0xc0 [ 740.989357] shmem_alloc_and_acct_page+0x1e9/0x800 [ 740.994296] ? shmem_alloc_hugepage+0x5e0/0x5e0 [ 740.998968] ? update_load_avg+0x2d9/0x2570 [ 741.003283] ? perf_trace_lock_acquire+0xe3/0x980 [ 741.008133] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 741.013328] shmem_getpage_gfp+0x6cf/0x4190 [ 741.017666] ? rb_erase+0x3530/0x3530 [ 741.021459] ? shmem_mfill_atomic_pte+0x1c40/0x1c40 [ 741.026467] ? graph_lock+0x170/0x170 [ 741.030258] ? print_usage_bug+0xc0/0xc0 [ 741.034312] ? print_usage_bug+0xc0/0xc0 [ 741.038364] ? print_usage_bug+0xc0/0xc0 [ 741.042420] ? print_usage_bug+0xc0/0xc0 [ 741.046477] ? __lock_acquire+0x7f5/0x5140 [ 741.050699] ? check_noncircular+0x20/0x20 [ 741.054924] ? __lock_acquire+0x7f5/0x5140 [ 741.059146] ? debug_check_no_locks_freed+0x310/0x310 [ 741.064334] ? __lock_acquire+0x7f5/0x5140 [ 741.068581] ? print_usage_bug+0xc0/0xc0 [ 741.072651] ? debug_check_no_locks_freed+0x310/0x310 [ 741.077828] ? print_usage_bug+0xc0/0xc0 [ 741.081878] ? print_usage_bug+0xc0/0xc0 [ 741.085931] ? print_usage_bug+0xc0/0xc0 [ 741.089979] ? perf_trace_lock+0x900/0x900 [ 741.094220] ? perf_trace_lock_acquire+0xe3/0x980 [ 741.099052] ? graph_lock+0x170/0x170 [ 741.102843] ? print_usage_bug+0xc0/0xc0 [ 741.106905] ? perf_trace_lock+0x900/0x900 [ 741.111137] ? perf_trace_lock+0x900/0x900 [ 741.115364] ? graph_lock+0x170/0x170 [ 741.119161] ? find_held_lock+0x36/0x1c0 [ 741.123232] ? print_usage_bug+0xc0/0xc0 [ 741.127313] ? lock_downgrade+0x8e0/0x8e0 [ 741.131454] ? lock_release+0xa10/0xa10 [ 741.135425] ? mark_held_locks+0xc9/0x160 [ 741.139577] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 741.145115] ? iov_iter_fault_in_readable+0x23d/0x460 [ 741.150299] ? iov_iter_get_pages_alloc+0x1510/0x1510 [ 741.155477] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 741.160482] ? ktime_get_coarse_real_ts64+0x23b/0x390 [ 741.165676] shmem_write_begin+0x110/0x1e0 [ 741.170000] generic_perform_write+0x39a/0x6a0 [ 741.174592] ? add_page_wait_queue+0x2a0/0x2a0 [ 741.179181] ? file_update_time+0xdc/0x640 [ 741.183405] ? current_time+0x180/0x180 [ 741.187388] ? __might_sleep+0x95/0x190 [ 741.191366] ? down_write+0x87/0x120 [ 741.195074] ? generic_file_write_iter+0xe5/0x850 [ 741.199909] __generic_file_write_iter+0x26e/0x630 [ 741.204833] generic_file_write_iter+0x430/0x850 [ 741.209594] ? __generic_file_write_iter+0x630/0x630 [ 741.214698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 741.220238] ? iov_iter_init+0xc9/0x1f0 [ 741.224205] __vfs_write+0x64d/0x960 [ 741.227931] ? kernel_read+0x120/0x120 [ 741.231824] ? __lock_is_held+0xb5/0x140 [ 741.235894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.241421] ? __sb_start_write+0x17f/0x300 [ 741.245735] vfs_write+0x1f8/0x560 [ 741.249273] ksys_pwrite64+0x174/0x1a0 [ 741.253154] ? __ia32_sys_pread64+0xf0/0xf0 [ 741.257469] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 741.263030] ? fput+0x130/0x1a0 [ 741.266307] ? do_sys_ftruncate+0x44e/0x560 [ 741.270625] __x64_sys_pwrite64+0x97/0xf0 [ 741.274766] do_syscall_64+0x1b1/0x800 [ 741.278643] ? finish_task_switch+0x1ca/0x840 [ 741.283131] ? syscall_return_slowpath+0x5c0/0x5c0 [ 741.288150] ? syscall_return_slowpath+0x30f/0x5c0 [ 741.293080] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 741.298531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.303371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.308551] RIP: 0033:0x40fcc7 [ 741.311734] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 741.332295] RSP: 002b:00007fced9663ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 741.340018] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fcc7 2018/06/05 09:48:02 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) pwrite64(r0, &(0x7f00000000c0)="61efa35992b8081b79ce9a0bc5ea20dad29d13aeaed3bf0ed82d4b750d67f2b4d5d528cf8800a956e2383ccfb53c66c45880289dc76e94c6cd6a4ad168cc5d5a10fbba347a5f2f07054bd40395cc53b2a2d401bc14dabb35c2a430b8ba8029824e424af987ca3b005cf497bc3ddb841bce29645aee48c6730d728ed09cc6afe255a903c310a1ed659dc4ea94ee9855b07be51a7c67357bb2de061b7e73c94fffbcf7570e2a082f5a1add6c1c16304538ed9d6af61153842922eacde373c4350d29a881192939c4ac3f1105620efbf9033f936e852077834c3b6e9bb13820531b6ad75c0cf6ea3b0e8362bfe9ba193736bd06ef0942218d539f", 0xf9, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) io_setup(0xfffffffffffffff9, &(0x7f00000001c0)=0x0) r3 = eventfd(0x4) io_cancel(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x5, r1, &(0x7f0000000200)="c5c6aaea892831ab71587f9b28e230a193b2a1cc673fe18a06c0f4d32715013433bb0f0fc6ff215cb38ed0a55d1cf070dc59cfcde3a5c9c38a4b05236b98a5d7f13ad2ff30c56cd6dab6530c53f197f41c6cbc09b6093055976d865c2d13aa53ff10c8c6feaab8b74a9d7d9c0e5ce41382e3bf16c01be747f3920aada8026e728df80c24db2668aa", 0x88, 0xf6cb, 0x0, 0x1, r3}, &(0x7f0000000300)) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000000a004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x10) 2018/06/05 09:48:02 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000004ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x8000, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) sched_getattr(r2, &(0x7f00000001c0), 0x30, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000240)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl(r1, 0x3, &(0x7f0000000380)="e7a5784093e64f459974f667040759f455792de69d48d2e5dc26393d139e53eba4001dfcc9c3cd89e85d878323ae51255810aab61749f96e972a4ea779a1eeb0aa2c335424cf7310f6ad83879cc33904d161508b1a063a979af1db844f77098372744402115ba36bf8c527e59678e1b47e8141a31cb86a762b076cde9892e7e06f4f1c84e7483706fcbe4abe5bbc51b2e63dee818fe237ba24bfb204e342968e0751651db574f35fe98ced3622e2d27ef8e5b84c5b3d8397af9143263fb77f4a3d3a058615f17fe81646b3590f3f") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000540)={{0x2, 0x5}, {0x7f, 0x3}, 0x4, 0x1, 0xfffffffffffffffc}) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000300)={0xe00000000000000, 0x5004, 0x1, 0x1, 0x9}) 2018/06/05 09:48:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 741.347305] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 [ 741.354566] RBP: 0000000000000000 R08: 0000000020000318 R09: 0000000000000000 [ 741.361828] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 741.369100] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000004 2018/06/05 09:48:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e1f78c80d9a0000000000c5a04aca52b1f16db3b6c71bcfcf37000000", 0x200002, 0x0) fchdir(r0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f00000000c0)='./file1\x00', 0x26, 0x6, &(0x7f0000002380)=[{&(0x7f0000000240)="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", 0x1000, 0xffffffff}, {&(0x7f0000000100)="2484182353f89b2ad2db5f562c3aa1efe927e6eb61bb60eb91ad00accdb961b8b91c8f0d7176e20cd838c305f1660d160818614eccb524d6cebedd34d0401ad5c762f140efed365b0c5e25b45c6169becce908d4a272f948042e5a09f5a4ce962ea1d093a0ca04fc87226520c705e1fb819139f399257bb132e66cd3602f171f0476c2f3405ec645d8761ad0381fe4662ab60b3b16ab478982e92b17e19a9a0525cdda536adeacd700a214cea6a956b7", 0xb0, 0x8}, {&(0x7f0000001240)="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", 0x1000, 0x3da5}, {&(0x7f0000002240)="777aacd8170302dbeb4ab75afaf747233790b8cf02519350d6e5f913123481e05e09b9b55576f5affadd6bc068259d5bc71e412eddecc33ca8fd66d64497630ce3dfbf6e43652950d1f306589c7752d6ef7996b6265da0cb2ec53652bee1460a14677cab8681efcd4d91512eb717a0ad60aabcf73e2c3258cecfc07fba560f373f0b7102c3a9a65cf1aa169a6a4198f12028effd519c4f05896e3790e57ebfa70214ed89d99810396355b549413d6a9be1a68dc2906a31eecb9f5b6696a5c8270cbe31cadacd041243c068871ad5b5f87610fa0b30cc5905172c4005ca52632e1ecdd8608b6b9918c45ae61dec77ba3341bb6d2de078ce15", 0xf8, 0x7}, {&(0x7f00000001c0)="c7cd006d9ff1f14d6c676c523e01", 0xe, 0x100000001}, {&(0x7f0000002340), 0x0, 0x1}], 0x4, &(0x7f0000002440)="2e1f78c80d9a0000000000c5a04aca52b1f16db3b6c71bcfcf3700") rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000008004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff0a001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) creat(&(0x7f0000000140)='./file0/*ile1\x00', 0x160) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000]}, 0x10) 2018/06/05 09:48:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x81) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x4, 0x6, 0x8, 0x3, 0x7}) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x11, "b999b04c8aff9f54ae1c1d666f15a28e01"}, &(0x7f0000000240)=0x19) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e21, 0x8, @loopback={0x0, 0x1}, 0xfffffffffffffff8}}, [0xd42, 0xfffffffffffffffd, 0x2, 0x3ff, 0x1000, 0x401, 0x2, 0xffffffff, 0x101, 0x0, 0x5, 0x7, 0x1b6, 0x8, 0x6]}, &(0x7f0000000380)=0x100) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9, "3d677f2f0e465e7523d6d2858745b39cfc8641d65dfe438a19e84d0d021d131022191d3fdb3f7704f50e623eef876be2a11479631f339d0d244303a11286c7f4", "ba76dbe16f8cb088adb01bcebf2e234fb2ce5e987a4d4cb4b7846180d2fcf6c63323027b34b59a4ecdc2973337387bf4322efca6533667f0c46133da4ad2e7f3", "8b62d29a4536c26fce948871b83e252bd9dc3759d98e4f5fdb04fc820a88bacd", [0x3, 0x7fff]}) 2018/06/05 09:48:03 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff03001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff000000020000000003000500000000002b004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 742.059361] BTRFS error (device loop1): superblock checksum mismatch [ 742.096435] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0xffffffffffffff52}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000002c0)='vfat\x00', 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x404000, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000003c0)={0x2, &(0x7f0000000300), 0xd, r2, 0x2}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0/*ile1\x00', r3, r4) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') connect$ipx(r1, &(0x7f0000000400)={0x4, 0x8001, 0x7, "0bfc6a2cb4ca", 0x3f}, 0x10) 2018/06/05 09:48:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000017004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10b000, 0x0) accept$ipx(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 2018/06/05 09:48:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='\ntrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f6", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x44000000]}, 0x10) 2018/06/05 09:48:03 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001800020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001a00020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000003004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:03 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x10) 2018/06/05 09:48:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02041300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02021300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f00000000c0)='./control\x00', &(0x7f0000000040)='./file0\x00') openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x200000, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xfffffffffffff10a, 0x2) sendmsg$rds(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e22}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)=""/250, 0xfa}, {&(0x7f0000000200)=""/3, 0x3}], 0x2, &(0x7f0000000400)=[@zcopy_cookie={0x18, 0x114, 0xc, 0x81}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000280)=""/3, 0x3}, &(0x7f00000002c0), 0x20}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffffffffffffd, 0x6}, &(0x7f0000000300)=0x10000, &(0x7f0000000340)=0x3ff, 0x0, 0x7, 0x800, 0x2, 0x0, 0x100000001}}], 0xa0, 0x20000000}, 0x40000) 2018/06/05 09:48:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002024e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:04 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='.trfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x10) 2018/06/05 09:48:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f00000000c0)='./control\x00') 2018/06/05 09:48:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002044e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:04 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001800020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf003]}, 0x10) 2018/06/05 09:48:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='/trfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 0: prctl$setfpexc(0xc, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x100) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x40, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0xb, 0x2}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="2e2f7367726f75702e6e65742f73796b9e7d5b979642ee341806f0fbee9adf078eec4dbbcb350a642665f5b2ae4efa0c850000b31038c70b7248ad6390be8eb00e3cc47280a70f5eca1f900000a22ff3e634ebd40f7ae0a2bcc3", 0x200002, 0x0) fchdir(r2) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="0cd6ef9bcc892c8bd48fb52323203d92c90082a96e2cdcc345bf1b50de334c67ed880a5091fa14c1bfde7bc171de0624740f675b50b0970ed3fb67a20aac2d961bea075b37ebf10b517e76069e7c9b24ed430d663f6f9b9026bc6201236e28406278357a1d1bd7cddd9b0a8bb2583acccd18f1f5d209c8e9e4ced0099b8662083d3f74ef7f9041e6b7d682f819989f5b4da4ba89e1fcf299336a66f3f35d669ad40c6647c16ce1a20528fc1d4d406a315d7dc0ea92c80c6eb2d609a70b6710439553ba162a39225461f66e1aae02178ffec00848bd306b2a89c5f22f6302fd73f3f2bc4e05c13c9c2b714bebef5af8e464da957965ac2eac3f7d55412b6be727278640fd901aca537ae222b922e1315c1f8cd99dd5fcf244d1d4454b2eee2436c7bfe6874d9b351d009753b65390d8f37152d4a7def816bb6d4f9e6daa7f4a9e3b90ee89cbf524e9fccdde8f74ea824116e82208160a815b959bc65fea56b84c47baae3ec0f92da0de78fb3469e97d8083db998af92d5727220f049425ffb636651bf24c08c9426c934f126b7d98f1008598d60a326dc559eda8d17192f9a02e4721f86d8dc4c362783a2e31152f49ace790d89b5126934698b8d74a175e75adae118ef9b19d3a541c1667c836bc754f79914cfbbba0b814739ebbe19b551176591d510e77b2e0d05593b289d416222692853d0c28afe9b779a41d368e1e4ede1950afa5f4454eeb70564ae3fe64c74810d5a37c5dd3865ac437c0e7f76e0615fd36db9d79317b0e2b766d742d856ddfb45d349e88e88e71813f651d06f2904a5b12eb577ce65464911685b196fa7e7a988786167d238e0bb60453248ae00f8e170684ee91439556ea4bbfe98027e8814dca631d6a9cbd725ff9c8da67b6516a098e2b2a840eef17069dd175722b232b46cc7643fda0d81568fbf11d18ab2e0cea8cf40df5237816d863ae70ed2e1d8d72558738dd2954ea1fda3b519f3e70ac241c0af6b629f371e2a24389a2522a42c5a00660037a871e22ec1f034e98c4b28fed81cb8bfc866feaf696d4793ab15f1b14a7320a694c133bbc86a5e73bb0f633f8cdff780952efe076c26b77f850ab5bd93a416e01b401c279fd564b0fa75d9bcbebcdb67f28e75133516ee90ffe04d6067e98cee45b04d31da6d0772bf961d170ab3a60c585b9e2cc2a5477fed6f525f18c5003ab9394e2e757b01d7e22a501d8841631487609edd9be7506bb3c2f1bf1a359eb8487672b3097edd8a45daf413451b1b89fb9bd0ab3af1c6b3fa9c3bddd3509239bc95d66a40a7cf5bcc95fbb34564239228ad5e3478b65089bec45f40c950b18777e0eb29fc398c6a57a6547219348310ac933631a0fa53b1dbef487bea703230d501581e636688959898f5eb8ed0f2a45e61b6d35589d9b4098494b65f8b33950567418bc6729cd1969f981138134f7ceccc44d69ed9cd531e798860b941e250c50eaa7b7c0d9c9eca5febce9d3ecdfa855d11729413412c05e20eee8c6a66e6e939c860c14ecc4fb8657222714f54baeb5b19885a77ae699528be60f7dd4e94a7cff5e0003b873c6dcef46d4978096529703ea2dca5615e4c6337ba454e2eab7a33b40aec0b6e40cd13965f68e1c8a6693b3de98a5c4734683110d75d2d99946113bfc6fd0b60efb8a04d5a835b2f078ff5b73eb56a177733761e6424bd466c82d40da366b1646172a034b79fb274eadcd6959718843c0af27c82fab3efee4ef7c292c2bf5765b8c88c882b3e82c12132556b3525ca994ac85d05cd5fbeab0025b4e165f537148c94d82d64073eed6b1672fd7c72c5557eaa6dc4f094b5f5e4bb9eb9f89ba8dda46dd0cb591024a48197d328deb41632cf42f6a9ec349d66766c778be372c90ccd673ed0e6fb352a3f5de7d921ce08e27765ba16bc95a1f5f97c2f06d1e2b8eb5978f8584b30ef6de3b395d75206b7ab1c47138c9801605824b54597ce8831666bc4162fe66710b61139ef46e911daac6e211a73fe38f5c00e66b67d084681cf06ca75582b9b0339e1f00f30727c448b4e5f1b0f661f9385d830ce242cb9c731f9919383a6b597c1cdcd11b1a98ac71d2834745f4eed2e6acd615f999f05f61e71d5f68fc805cf69e9eac87dcdc4860b6044f45a6b8bd0cc7db708bfbbece51665d0b4005b217350d3ad73e96a1c55b0d340e428f6b4b8b6655c019ce9b5ff3fbd24feefde3517d69287e1c06ae2ef5ab993a65ca5c952558992ffe19c454cabcb6848d238bd2731c4d8135ad17d4c8d16520bf530722eda3fa69f63afa46aea79070dcb5edfe51ed2b5b0f595bba01bf9d2f169118d234022e26e11436fa346756c22e219c6df5aed71c6b83be1c96d7c4dd2f4ac50de079f5af2501837ee1a64c3a33ce53d9da0bb69703ed78fe4fb543f88e64ff8e997d1b1f5ef30be0380e91d437848de2908bf586f60f0d22b158e5cc94dc8f4d4333bf1711c9db4f917ea3bcac3b830b5c4d3f89f3913eb5d3a76b2f6cdecf5af63dafdaa9f7ac92575c410925eddb6aad84c736e377525f45c59ebff28351867efd3a7bb17501b80b7237385abb8a929a3933bf198b57de1fa2239a7f993be1366ce651ab48fb258a823362bd18b288a7387df0e251756ee8774287e0621e768376779c989501891c921ee8f6ffc7f5f99e0a2941bd66509e984e6dbfe5014d5c9da716fa9914e995479da9e4a793631b4d8061b4cc569a272996c160f16b73d45c764fdaa3b04fe96d4ab2ec9ffd17b1d557734141e111a65801eea6fc28723971cda605211806b4e645c87c4173f56cd5b678947f5e8691fc7fc99db89b9364dbdf4f03de9323886e9947cbfb4e9aaf56d2b486a3e68515748f4afc90cbe00c43b8a65a77fa5aa6404fc0b2268f02f9153ea2e2d0bcf5473c4df10086e614c83191a979af13c67fdedfd6fa5ddccda35ace55954a21738a8eb97c2d488d713e704f2d590aebb9c63d018c9700f6327fd5196d2e87915bdb8ed2780875d5be4f83a809eca020c7d44683828c937a5483bd4db5323a5a5c9651a16177624b535b4f5e24f8dc1d594b71e83d6aa2377eb6851cc31da8c80a942e820273403cb9bbb57c7f7a79212157ddad24e4ecc4df8f22ddabfdf27778214e8d0a06f3c1eabaab3e4dad3c888fb936c9dda394fa7a6064ccdd0060dc19c651165b5a9514a7f89bfc988dcb7993ede7bfadeb3a2690413cf84bd2c2fb29fa4d4bc99290082e13a405f7b50922c82b62aec318506aa5ebc2dbbc93d2764910e939dd25b1b4297f15349d96edb0f403d81085758d69769fbdb887b886d1c41e64ab73b389ab20016372e01f7099b2f22d4b66b8b053eabf7efa42be97c0bf60316d6e6b665aec702eafc264db19e8b71c98f766e3df834316ba8c803eff658d72067506de1af851bd38ff2a34f266cfcd89fb1c02f4e68c8f0e78b04fbb3dfb6f0c67d6a5846eea9dd6c70c18cd528cc7903f1b26c9e3f239a55ed0f0e7099999658e870362475507be7540fe7b930a3f37840acde8bb89c5d47f0b148c272807a488c3a5e15717087bc776154a726164fbfb03eef830f578fcb064e465a0bd84a9209f56adfbecb78cd2ee8212e49644ff37688fa7b9036b184739971bc8212d5054bf41c3a316b969e0deacd92b3055b2b51f98a721fe368ec91cf57342f183a2ae3e1121cd527f0cbb664ba95a32b8ac766f02245a76d417f88305f6ae26817748f68390602d782454bab8f26700b0f21f94fa685402aed1919321d06125050d987d4cf7a7b4d4c0333c93047e446c4900d3e2abbd532013ce494ca77cf5884ab644aa743356dcbc67839c08817bfdfba367cdd80443040a044f9d74a9e15e4099b5f0e518669b4291fff0b8bc501c1cf2210157e604a3bcf1af9b5b11e5aca1aee65620440ae8e9cc5b286dd89811450e2bfb2397dc34cc99703e1fdea1e3676e3b3fa8b4e571f7772a8606bc7e6aa88d0c63353d1dca6389c466fb3333244f052b2a7a626542b9c584c227d4ffea0af4e8babb2408e3966941bac59f7d47b10d4b33409fbcfbce1b959588612ab0318ee864a1620a4acbde7e6175a3a77e823e07783138ff7ccccc02a5ce2211d545909860297c220834b82631020351398d17d14823e869374b677f4315d339358a8326e7c397656d5c78b90e5823e3f0e0fd8a7e02ad20c500333fe2ff9aaa41ef0267989433b1511f7bff445b69b3e86b6609c2b94832f3c66fdf69862bc67955a67c9573282f2128c3d0fe56452f569222d03cfaa9a43da2e725a1022ade6ea7bdb1da3cadd41961991c16666948a4791bb4b0690e35b3fcd8b13d91aca63222829505239aed8ad0c868118f9f55e3f82f916faa8b44dc40a4883ffa06736aa859d313e6042739c1c4d911ea4fdca373ce99ca12d32c84ab0d7e8b2c26047842b4fc43643517b9ac3300fa3645e5d3d0d0e495608e1a961dba6190460be8a7b6eaceae3135a317c406631d6eef4f612a04d25c043f358be91264ff5c335803efacb0786a221ef700675df2860757dce3c99447b516177128c2c462688adb90674f00aed8798238bd84393691261c2189e586f7f8c2abd6a5da34f2ab5b19a608ff617217bbf604845991b0caab31d312d3f2743c28fdef546456d57d9bb1785765047cfa4dc9b70beb34cd1ef7b22825eb68250e93899081e5362598e1664448e1e88cb4ac1240b74b7625e7720be6cbd7727a1d8935301ccfb920cde0bc71d61a31e855af2e01ceef40e351dfb214198eaff358f1ec11061ded47ea826121b19fc9bd62ee07f81d1b4c9e69cd0a6be77ef3a4f749a70f31d6b906b7b4b08d61dd341ad37e587d1fe2205dc47a3037ade115491197775ddc49c98af16dda5a5613bf8d810c23cbf52acd2a9fda7a0a113ae0f018261dec1396fde553b0b8886acb2d36aabf60e250a7243a0510095dcf6ec732e6d7f64e04bf2a0758a2fb61b22246af731acbdf8fcc0b37f5fc94a7bed948845a80f3416c039da68404e1bc5739bab60ca29559680d72aef8618c9176e1e407291b12caea4acd3367c838a22b8c83fd59c0e4a80c8129918f4cc9d1ab51a3a2d5e79fd9b097b5fc51adec618c486de6a34daa5ef3edce1066fc364e94a6562b91f9ecd0e9f491420d2f4e5ad2ca68eba12c0a4eab233353b03227da3d654f33cb97a103d1cf58dd4a0fff2ced7c83163ee5d477d79ae749a60d98a9bdf24cdea6175a9921a8221a6337e5d89080f5fb4d39d13922b65ab3dace104d29efddd161ad90ced974b6f951a352bdbe0d7d44262fe0c9201491332b398488594f618ec5c4557d9db2376b46eeb8bf489e1df9678aefbb5568dd98f7a8042565847f4befa9a6b5f2f3cc686a4e0084546e52b2a67878f4a9c9f623aedbe1c485ec816fcc2413be1c2d70db39d4f1f3e1778fbc80ac53d04f23805f5983eac288b2847cbf04978a824074d5eda9f2d1d10cc4ba5ecbeb243241477fa78381fe347fbca90fa03cffc24ac24bab18758db4982251785bb1f8bc1dc1b03ac05873453af0777e2abd8c33e148cc34177670bb26f203dfded7594f47f5405055f5cb0460f7a1a07415f14791bbb529627f6ec4eedba28ed4192988618c73f9164cff663f744dec3a4bd8560ffd45363befc1ecf3ac3fbf69a6aee925121fc75b0f3a3bb2b1758ecd3f11a0da1b48e8dcc6e5668d6a340c1e427560bd0ffce6762565a05de72e90dfe7cc041ef3ce05d1035a392512005713759be0bf1e6c42e55812be355f6ad9c3658c8aa6af4ad466644b90b323", 0x1000, 0xfffffffffffffffb) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000001380)) r4 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000012c0)='v:#lo$.keyring\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000001300)={0x5, 0x0, 0x10001, 0x9}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000001340)={0x8000000000000000, r5}) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:04 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001a00020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20f8ffffff0000000000000000"], 0x60}, 0x1}, 0x0) [ 743.178322] FAT-fs (loop3): bogus number of reserved sectors [ 743.184344] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/06/05 09:48:04 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 743.281507] FAT-fs (loop3): bogus number of reserved sectors [ 743.287467] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/06/05 09:48:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x10) 2018/06/05 09:48:04 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300030000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x100, 0x0) epoll_wait(r0, &(0x7f00000001c0)=[{}, {}, {}], 0x3, 0x100) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00200010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = accept4$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) sendto$ipx(r1, &(0x7f00000000c0)="4bd309de16a121b260b113141b196c9b7ba5021d1aa499a347701ecacf2b157af789f6fb8a63ae775e152d273c2678d6616d777d42035d2fc788fcb7bec9f05a624417ab8723c156818584d8b36c104c66b7641d82d87333cb4eb6e695583568611809825fd1ce9d151e2d4a16f673aee8e24e1096b96f1095a2171f3c79859ab98d86a11bdadb8358efbd9bf241e8f084aba4159dadad64a3027a5f7ea21101843250c06d122282057b4a20631a52a13d40d71a23f6e2b8d206a51ffdcc3797b445b7221ff496a7654dc5c5b95f02ee5f6317d27d10328f9e2b8b63fe5520f8bf5b74c0c3e9abad6235ea378445", 0xee, 0x20000001, &(0x7f00000001c0)={0x4, 0x4, 0x8, "93d7a4e9c839", 0x1}, 0x10) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:05 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001304020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00400010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)="62c072667300", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f1]}, 0x10) 2018/06/05 09:48:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x59, "ba46a9403784bcd8445698c5eeced15319400656adbabcbf728253b325928d5dae5f696570538ca8663d4d24d5ef4a72b355fbe5659040c5a9f6d28a7fcab4f55ae34570b3396f1980a407098cd70b20f755b6dd5497cb7422"}, &(0x7f0000000180)=0x61) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x5, 0x5}, 0x90) 2018/06/05 09:48:05 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001302020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fc", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in=@rand_addr, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) 2018/06/05 09:48:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00020010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, &(0x7f00000000c0), 0x800) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:05 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001302000000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x10) 2018/06/05 09:48:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000001300000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:05 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001301ff0000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='b/rfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) accept4$netrom(r1, &(0x7f00000000c0)=@full, &(0x7f0000000140)=0x48, 0x80800) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') ioctl$fiemap(r1, 0xc020660b, &(0x7f00000001c0)={0x100000000, 0xb8, 0x4, 0x5, 0x1, [{0x41, 0x4, 0x3f, 0x0, 0x0, 0x2408}]}) clock_nanosleep(0x3, 0x0, &(0x7f0000000180)={0x77359400}, 0x0) 2018/06/05 09:48:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00004000000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:05 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff020013000a0000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x10) 2018/06/05 09:48:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000000c0)={{0x3, 0x6bbe55c2}, 'port0\x00', 0x22, 0x4, 0x2, 0x5, 0xffffffffffff7fff, 0x3ff, 0x4, 0x0, 0x4, 0xdb9}) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/*ile1\x00', 0x8100, 0x16) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000180)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00004010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='b\nrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:06 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300030000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00002010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:06 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}, 0x10) 2018/06/05 09:48:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0x1) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000440)=""/65, &(0x7f0000000500)=0x41) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000280)) write$binfmt_misc(r1, &(0x7f0000000380)={'syz0', "989dbe0dc2b2e5897952b6283ba395110bac4a48349d3ad40ba3f78068259088900ce69e50b8e5fd7fec5dbb75e1a6c6db67526a7e0c61d93751a60909743dccb06919b5905970e8e4fa47256a8a7a556ee1777fb93b3ce5169132b5db0df9d07dca1d81f87d63f2eac80fbc63ea241582719cb4ed9cc5e6d75f933b8c6e0baaaf992ae64d41cb959b03d5dadcb51da48216357ae245a560a78590bfaa6d8134e122188a8507fb20c4"}, 0xad) read$eventfd(r0, &(0x7f0000000100), 0x8) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(r0, &(0x7f0000000080), &(0x7f0000000580)=0x6e) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet6(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)='./file0/*ile1\x00') 2018/06/05 09:48:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80002, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000140)=0x1) r2 = getuid() getgroups(0x9, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) syz_fuse_mount(&(0x7f0000000040)='./file0\x00', 0x2, r2, r3, 0x5da, 0x14) 2018/06/05 09:48:06 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x80400, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) renameat2(r0, &(0x7f0000000100)='./control\x00', r0, &(0x7f0000000140)='./control\x00', 0x2) fchdir(r1) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:06 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff020013000a0000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00013000000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000]}, 0x10) 2018/06/05 09:48:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:06 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000180000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:06 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000002000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) fchdir(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) rename(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:06 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x10002) getpeername(0xffffffffffffff9c, &(0x7f0000000240)=@can={0x0, 0x0}, &(0x7f00000002c0)=0x80) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000300)=r1) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) 2018/06/05 09:48:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x10) 2018/06/05 09:48:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000001a0000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000180)='./control\x00', &(0x7f0000000040)='./file0\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/06/05 09:48:07 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000004000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='b&rfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6, 0x32503) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000140)={r2, 0x3}) 2018/06/05 09:48:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000020000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000034000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x10) 2018/06/05 09:48:07 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={r1, @rand_addr=0xfffffffffffffffb, @multicast1=0xe0000001}, 0xc) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='bt\nfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='.Dcgroup\x00', 0x200002, 0x0) fchdir(r0) getrandom(&(0x7f0000000200)=""/226, 0xe2, 0x1) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000180)='./control\x00') r1 = creat(&(0x7f0000000040)='./file0\x00', 0x100) ioctl$TIOCCBRK(r1, 0x5428) eventfd(0x9) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000140)={0xdc, 0xf971, 0x8, 0xfffffffffffffdbe}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f00000000c0)={0x2, 0x2, {0xffffffffffffffff, 0x3, 0x505b, 0x3, 0x3}}) 2018/06/05 09:48:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000040000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000002000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0030000]}, 0x10) 2018/06/05 09:48:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socketpair(0x5, 0x800, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000100)=r2) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="2f03a7f6cee9a95eefebbd434a418d4963dce1bedffb0aa62c05be0333", 0x1d, 0x40091, &(0x7f0000000200)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000240)={0x0, 0x8}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000002c0)='./file0/*ile1\x00') openat(r0, &(0x7f0000000280)='./file0/file0\x00', 0x501002, 0x100) 2018/06/05 09:48:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='bt%fs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020020000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000080000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./control\x00', &(0x7f0000000100)='./file0\x00') 2018/06/05 09:48:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5e00000000000000]}, 0x10) 2018/06/05 09:48:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='bt/fs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000140)=0x1) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7f, 0x0) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 2018/06/05 09:48:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000180000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:08 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4080) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x923c0ea4e60649dc, 'rdma', 0x20}, {0x2d, 'pids', 0x20}, {0x2b, 'memory', 0x20}, {0x2d, 'cpu', 0x20}, {0x2f, 'pids', 0x20}, {0x2b, 'rdma', 0x20}, {0x2f, 'memory', 0x20}, {0x2b, 'cpu', 0x20}, {0x2f, 'io', 0x20}]}, 0x36) 2018/06/05 09:48:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2400000000000000]}, 0x10) 2018/06/05 09:48:08 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020040030000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') socketpair(0x17, 0xf, 0x5, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001c00)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c40)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001d40)=0xe8) stat(&(0x7f0000001d80)='./file0/*ile1\x00', &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000001e40)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast2}}, &(0x7f0000001f80)=0xe8) r8 = getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001fc0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002100)=0xe8) stat(&(0x7f0000002140)='./file0/*ile1\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000002200)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002300)=0xe8) r14 = getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000002340)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002380)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000002480)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000024c0)={0x0, 0x0, 0x0}, &(0x7f0000002500)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000002a00)={0x0, 0x0}) stat(&(0x7f0000002a40)='./file0/file0\x00', &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000002b00)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r21 = fcntl$getown(r1, 0x9) r22 = getuid() getresgid(&(0x7f0000002b40), &(0x7f0000002b80), &(0x7f0000002bc0)=0x0) r24 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003740)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000003840)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003880)={0x0, 0x0, 0x0}, &(0x7f00000038c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003900)=0x0) fstat(r0, &(0x7f0000003940)={0x0, 0x0, 0x0, 0x0, 0x0}) r29 = getgid() r30 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000003ac0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00)={0x0, 0x0, 0x0}, &(0x7f0000003b40)=0xc) r33 = gettid() stat(&(0x7f0000003b80)='.\x00', &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000003c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003cc0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d00)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000003e00)=0xe8) fstat(r1, &(0x7f0000003e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003ec0)={0x0}, &(0x7f0000003f00)=0xc) stat(&(0x7f0000003f40)='./file0/file0\x00', &(0x7f0000003f80)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000004000)='./file0\x00', &(0x7f0000004040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r42 = fcntl$getown(r1, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000040c0)={0x0, 0x0}, &(0x7f0000004100)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004140)={0x0, 0x0, 0x0}, &(0x7f0000004180)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000005bc0)={0x0, 0x0}) fstat(r0, &(0x7f0000005c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000005c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000005e80)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x44}, {&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000380)="db845c84707120b5c92d9534c1c4215dc26c9e9587fba580f387e196273977e5c27e52c21380442e2b2f3cd46ecd665b134edd8225e541fae849e22d9a5af633ca2573532ba89d256270aea6a98c32c6396483613c1e03ee699ccfe8fdbeb1b743aa9b86dda39acdff29406cdc7f2978871bd4d010046c21b4d407a49c", 0x7d}, {&(0x7f0000000400)="81d0de364d57d73eb9a681d3a2ecc4ab0456ad94c2f1ef4e0343071e2962864ed4f42f0282768b3ee986d5650e2e7b66152d788627d7153038c03977ff5f950aa9d93553bfc513599ffed73827b4f3ca10b8200e9cda5e2a4b18312136cc3529aa1cf24e3520ffd6166dfe4a817116418a9b3576b64b4dc357a3d84138e72118ebe15c924b28fc5b9b51598eaf954811958b66fadb900f13b6211f68de9f56f6f50527c1e402bc2da622bc0c94784b7256d9b0f3ac", 0xb5}, {&(0x7f0000000500)="75deb4b79d1ed38448de87e943240df6150156a2328a5f88aeea8369f894bafb744bcd3976fee66189c4fd7d8200fa5b38537d59baffeba4b580a0ed088b729ae6e50f8c72a348be3d097392c101d5ce07a072afb9878ed7df5e290689e76d1947c49f3d6ffbeb8ee88e161c35c5291a73137398c9516c0d1f48d7502658db78f5cc261dd80882895efed2c70ea84f52695dbbd316b2475f3108be0e02a5f7839917c562d89f5695395b28a8b1a2b10f84ee73bb0e7d4ab668656ccb0d46cfcbe241212de9356cc22929de814e0a735068fc", 0xd2}], 0x3, 0x0, 0x0, 0x8000}, {&(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000000680)="9567497c13110081ce0fed63c408d152fcafbbbdaadd8fe8ab8836f0bd7759d05586936a7ae802", 0x27}, {&(0x7f00000006c0)="55cd6b5d75c84276f4f08dfa343d7430d4605f097fa035021acd56549b9ab705896ee0ee6805dbb03d79626d37c207be4c309c130afca0dc2bda5ff0e139628977fef3b01c0cb6c812144b61e071af1a51585114e7e617c9f0e955dc54e2850aa9849c59b48f0a3fa9354de319881e5422f3997e71e32d08ddb04280c6101ec563f373d703fb7645f4f5668ab587ab01e51aa7971eadbb741d31c378b398fde002e6f55c597c363c3f989905c464019a9008bd6aa292ff13c7f692e57004998a5d956f4d83d20db46916873b17b1d3d756a265a9251fa4882835e448211f79", 0xdf}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="614e4bf2fd5153d41a8935e95e677a758f339fb9ef0aab4781a60b837d2eb0a3fb09fb121c39b5ce9c27629ed4b0e89f98d34b9bac73271a665f7ceb5cdfee1e31879d4a0d3516959bbc851a2d3ae7bbbc2a980eb624227b118356341ab126751c38699b94fcf810fc73f1dad61df0faca49f2ee211a0b122b0d72644970fb5ff84f9bf0bff1", 0x86}, {&(0x7f0000001880)="7c41d6afc6ef410f31a6fe9775aaccf5dee9028fe0e48408f0f36e916f122f45c97d7573200457731ca94e79b938254cadde25", 0x33}, {&(0x7f00000018c0)="500b81400f68d4abb11509de11644c5f62a411992e678a057bf5ec6dfc6abfe29c5da47982723e642ada976c07ab27d46533e0d2ec6c87bf0bf2cbca65e76e4bdd01825bc29a30410e814134a6913f8dd78e8976315424384cff174dc3f18208936ab515b6c11750368c232fb14b6061a628025a5806fdb7435ab4dcffcabd2f7f6f5d8817a118200139b1c0fe95b66c920bb6000791fd6e4ee98a5fe0246fb60cb388a67165b2521d18ebebe9d3577d058c8d56", 0xb4}, {&(0x7f0000001980)="b2abb76b4d34b8f64c4047ef60661b8cb2a1933301c4256dc5dec25fae2fcb8dd8ca384092eea0c8d50ac02fd87548277858fa9df9278d5256606224830be10b5f1277bba6bd77d30287ec19552d4319a8d7db3dc748609bcd2436fa5104a3c85744156964f4d52534b1cb69bddc685dadf0174246f8b1483222bdc1c6412c4677f52d62aa5506cc2de44e846f1358d3602bee06291d22705a79210f046e0ecb00bdc2f0a9a64353a6", 0xa9}, {&(0x7f0000001a40)="c2748ac6f2d9b493227b9a7d8cb4f23fb0bfdca962d75e23b3f4f481dc7555501b0b8277364e251755eaf43a6f0f2cb63bfe6c375d9c4ef40786ed0209849cf1186c044bfa8e4fc122041395ca82d6318142bc462b54bdfe659992f66c50852da887965191c6ec608508759757cafd29e78833b1b73825c9ad99614110caa5cde09135cd16", 0x85}, {&(0x7f0000001b00)="e0cedb4f73baf60ff17bec030e", 0xd}], 0x9, &(0x7f0000002540)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x28, 0x1, 0x1, [r0, r0, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}], 0xc8, 0x20000000}, {&(0x7f0000002640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002980)=[{&(0x7f00000026c0)="17d21641", 0x4}, {&(0x7f0000002700)="f87e5e7b8b4922954add57cef7ae3003e09d4e490a461462073f55864a6d866fa0d5cad73a5e7a6d98f6f77d5db183e198c6ca84e9f76a2dbc73e27102c27a225d68c1a9fbb566619851d53e7294142fc065272857c858bc7110fb93f210d84dff2bd2d3cef6e4b28e4280a3a79dcdc5bd2f775ec089ec36866da18eab54cc51e38c5358cdf5b734ae8251a18b3b2bd193c50fd02c46", 0x96}, {&(0x7f00000027c0)="a3fbcd01d94b92f0e4320aa868d6178313a310415ca5d6a6f3dc2e288c1c36c0a4e03f427f725874c4009f410f98f078", 0x30}, {&(0x7f0000002800)="365f2d1215265688c6dcf464e41026c8cd8d005ff84445cb502be45f420142c03622dbfd32a7a58b0724619a7adc7f8025381c1d9e0455903324c6fdca73ed55b90911c701c3405a55bd9e3e3e17162753ac1f13b9b37b16eb74606030099c764f813c866bf2a6fd7119cb41e46870a17b936e761d882d925519450bfc7dc386f6b9a28405366988bd7ea7614ff95805a25b6c1b1bab80512b1389ddd0ce53c9dbf8bcd9980cffb664f79c7b9045f39f0c2670882e0392d3ca853e8e643ba94164", 0xc1}, {&(0x7f0000002900)="2740cf5f3a6af0d443a434b36fee5829647ce64611666bdab4ffe4def6a6ed79c02f3110166dcc8b563fec3dd8884e60f297784687647781d503dc8c28cc64355a0dbd4ec5d3f7ff1cb9207382ea4d07f3c4cfd5143d510067900bdaa0b500c9c30012a61757e97c1e124a4460e6e1a77e4d467e8803baf72d6935e70f332ed3", 0x80}], 0x5, &(0x7f0000002c00)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r1, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}], 0x70, 0x20004000}, {&(0x7f0000002c80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000003180)=[{&(0x7f0000002d00)="c7caf699d6afd49a099c1efc49cf9a365a9d3fd80da84f2565434938e1c98e9e5617e9283ceb1c6ad7f469c6ca5c57b47da8bc21ae8cb26673fa499e3821e365a63ba53d8688ad61", 0x48}, {&(0x7f0000002d80)="933c4c6d3abd33337070f5da8998fe510e2f5de2e93cc27009cd2ebe7c2fec2eb754a7bee524006d0b8a4a2db777b901abf149a11da1ecb65167a2c42475", 0x3e}, {&(0x7f0000002dc0)="c45895e4e46a97cb973407a7a18e4c5cb3e545b1c0c0bf93a126ed55a143867e244022acb18fd62eee0d162751b2a12b283e", 0x32}, {&(0x7f0000002e00)="e89720bebfce04ad8af21d6f1c47cbd90416bcda6a8403844dd98e2f95467df2a6f0a4cf45c3411b670d3ae11cc3b70033ffb763defc910dea55f45ced5a4c15c18c2d329268193be46ad4fb4d5b580a84a28706e10dc1295cf3adc34f9a123444fb968aa7dc4f5d2a8cacd136f03653e259df3b7f59c9b77e8ae0f57d96591f769dc079267fa7a54655eb7931b227f59f8bc7f534", 0x95}, {&(0x7f0000002ec0)="28e31a7c09e9148e7881c39a0401c439d0d34672975d0de5c1da86b753b6fc6d3be4ecb71a324a28724323b365a8b5cbaede389efad00b2bb392f2e491eb04d6911d4d", 0x43}, {&(0x7f0000002f40)="190a69fb", 0x4}, {&(0x7f0000002f80)="1e96b0762aad951a4e7b8ec3fbb37d4c16ff7fdfff76a402351df66bc786243264da0a7b36e28c860dafe97703168ce7b3d9df3250effa91e5e13ff25c082b057d4de64424b884179d8f413c5ed5dc220eb719892328fd0f8b87279a4cbaba2a2c2099c50bc53bbe0a6e9ee401d49d8fd3ba750992de463d61c53e60837a617bfce64198cd9a589343ae75f2151e79d13f170b8c22819ad901c9fc2ffed46fcc5b5c4d660b028e3c73e5b15f331f50debd3b3ea85a00b340df0677e67a2b3e", 0xbf}, {&(0x7f0000003040)="be8f0aad17c2edb69b0533e428aedb61dadd0f6c89f6388abcd03fd77360319ea07bf2e789a5bce021e1fda78026c1cc6f8657427d155232e898092d0f19382d89cf718c84f30a8b6d416578a3b984f38f07a650b4", 0x55}, {&(0x7f00000030c0)="6c5caaeca6e5ef40bc1fcdae9d7ba69031ed729e29adab259f706455a9ee5a4587b9a0321921b8799e054081f6746482c4aa3ad4d74173c2d11581edecc647d173507486ed1e959cb6b0dd07dfc56b838db0c84a47fd4991581b2eb0ed5d78ddea32ace17aea6bbd4e92887ab71cd064ad7d0d093a88911e56676b441c1b74e7c2d9f4f2e5bc0e1ea184db4da8898ed5bb1d8db3", 0x94}], 0x9, 0x0, 0x0, 0x4}, {&(0x7f0000003240)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000036c0)=[{&(0x7f00000032c0)="114fa457e43e6a873c2c62d0f0fecdc66d36cc50340a0a6fb0063517672824446608b72d6d9716a209c0ac0792bacd3f6c1df945aa661485b15db73a1d1d1ee73af3ef2efd88d300cb649bbffecc9ae02d61871299709e6f137582cfddfa675489f453417623fbb82bca6a90ad806ca693721c3aea82685dab63379b106d", 0x7e}, {&(0x7f0000003340)="8a48262f038726f94058c5cce5ab139c0b8909171313c13e87ddb4a3d027009259828bac9a82e1954c011470396b6aac9b368fdd7e83c7a1a1831b90d16b2fae6b639764937ae4858cd3a9b0f806d21f972dc4d869b1aeb545ec6f6912658d", 0x5f}, {&(0x7f00000033c0)="3cab90fda1321176031553c7c1de1cd5ba0efe75a5991a5de3b7d96deb5cff47c9ff64a4b0b462f1384541d111857e38865837352b7ccb4d7b8de64a5279caacafce9aea8d9d4e1e25f84a35e1f9635c7295d9ae0770176c06f0aadb0286299cb984054739a3886a63bceb", 0x6b}, {&(0x7f0000003440)="fcdb22789c492eb0c9b207424a15ea3d34f09fbc6c352a5c5d550b18a866f88cd5c82f6604bfca6c5c8574fb0a42040eb10a470f6504c48f3e497f8c60df1c372e9dce11a068ad18da58e2d961f2dbffe44026dafa969c071d4cacc9432d4789acf3216028db60e0164df2f7ed", 0x6d}, {&(0x7f00000034c0)="28ac27cc68e42c582414f88e1321453d7d90cf1fd0b84052eec06b3f2c05c2d1b0807024d8afba4cce3472607fc046aa86285f24ec2998564472a661eb8a03715d5d94ccb3c2edc4e12926ca252effd6b77db51b7679", 0x56}, {&(0x7f0000003540)="1c8d9f949e19bf2b3ccfd310c0011053068f29495a85c76edc71cf3117f3ebb55e745f271218dd0643ff9ae837c03e633ddd2c35f9b920dcae29b663f598f8fc9fbc3ce9aa6031e005eb0d2bc6d08188993706df69123b14b803a2266b0da03f34cc0e5b402f0f8e1cd13cd0e6947156e00f664621039cfcd24d1e2841540f6bd815efa736c67efc3a1e6991bd409df18018a6bc7d9960bf76df11a1aeed94073b7730c22e982027afde35e874a19efe5c9942185c889b3bc2cf4099e8a3ceaec182", 0xc2}, {&(0x7f0000003640)="c6af32b20fdc1b1845ffbcc779e700c404f8eb6ee54d8bf92eefc3ce0e0cbc501423916eab1881e1af99c41b37dabfa7765bc36edc09f8cb5c9040718b82caaae6b6ff6b0666e919b2da0d67a6a219723e4f12c6fd5c6601d5996bc1", 0x5c}], 0x7, &(0x7f00000041c0)=[@cred={0x20, 0x1, 0x2, r24, r25, r26}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r27, r28, r29}, @cred={0x20, 0x1, 0x2, r30, r31, r32}, @cred={0x20, 0x1, 0x2, r33, r34, r35}, @cred={0x20, 0x1, 0x2, r36, r37, r38}, @rights={0x38, 0x1, 0x1, [r1, r1, r0, r0, r1, r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r39, r40, r41}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r42, r43, r44}], 0x150, 0x4000004}, {&(0x7f0000004340)=@file={0x0, './file0/*ile1\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000043c0)="decc2bf47cfbd685b9d2f22dfb2712e145", 0x11}, {&(0x7f0000004400)='!', 0x1}, {&(0x7f0000004440)="6e803eb090e639f6751c55d6006f1e545b0fc93676fe36fe8ed2d6ed40d83cfb7a2d8818e4fa170d2322603eeca9df89efc9e7f9501c5a3550964c8eee176e113994e59694510c", 0x47}, {&(0x7f00000044c0)="aedf0633be39fe5eb5c845e0bc56a23caafd4b3192a8f02368646ea4247f56f42d742656a88cc83a5fdf70a5433b054a4a2bb3950225d7064107b2af8f0885c11289fb42a73ca2968debdbae234cbc72ecc2787a23ad7d3948f3305e8a4d1ac1273041bf9c60f70bf557a30e584074ddb137123ba206874a3e686d569f2ded488e477286b54bca64c7225287ccc6411d1de71eb4691af85087ad84a88a563f749d293f316c74bb5b9dbe047e38aae645e0d88dfede035817efcab88ebaa6e328d6e63e636f0611d267af2d745ef546b3c63179676e1a36d63cbf62fb913510be364831b0aeb446f445891858568699d7cd08163e57b04572087cc207b7c2fc4fc2d49ba1b515ca783b697e015554c8124467a49e60ba25db6a926f376da4c68da0e7632bcf7709c5795f9aa48820d790041a474e62e23a39bac239ad4ef43db3bf7917e5d768a9fb9bc505b85c946d0a427ed959d035c052e882f1d3dd00cfa7a6404edd6bab2dabe8aeb473d75245952d5efc1f5e1f5ce1e3a29e3f5766a1f430155933279b1dc82c6c70dca45a600d3196dbf624a9b14933d6066a783157c366877baf61669206ed74e1f0b3e5384eb2bfc8ccdb5941d1aa9cab6cdd25b4e8909e7d5967bfb00345a87865635d78ad01fcdd134dc22c85385b74b93e4b50ff385973e4828ab96fb9464a5ca0c3badc74cc79e39dc9b91b55f51201bddc0aaab699340bba5387ca2bda6ff002dfd4de953ad6bc64fc834bb6ecf9653b4cc9e4671a6713bdb51534a4a0096d6d6b3298648d273b68cbf2364e914495bb9543f9f14206f12decd10420b41355088444d3ff4e682e53e9a23de1315957c599c21bea49b29793ce94751a2d63ad2a7f3d7aa4f271e0865ccf950f5752d8f32e46720a54b4a5ab2659bbc15448e17a5cb1ec20e3aa5c59fea25ed0df1bffe52a1b72972dd88233c6403f350f8429b634a44386de019e5cdfa0dafa1ed26c3dcea6607ef37e652cd26436294eab03ad51026620a3d92060ef0aef6cb3ff189350a507f57483935e1727f4a88be2408080686ee6570edcff7bdb411d3defd4b2e0385706b4fde657582457d95a744aaca421eb824497130f136b7794e4692a96e507abc5d49d46c375ceeafbe460575a82ff8f15e182d62ef38c52f4069b9ba37d2969e1953ed6f0aebf38c066e99a1b556d110208805da2725ed980e2bbca1804d307a89bef1d431e61dda76032afac8dab06828ee81251b8a9fe088a64d052f10ddd61071d41588f2248f4aafcdbf9cabf4b8c52a21787e65f147efa0296d6b80f706637c882c402fa3d24d698779352355ef17187a8b8f31928c226e3622985db4a83d4bc6d4a898a8888ae92aabe8364d4be7a13dc8489b447d9c78d02694e46327c79d600bc7db7375bdd8fa472f35ed69dd06aa73c10615acaaef55a72d743cef5620770429181c8b5fe2ea3baeb2eea17cf81d93f9829cff384c75270618cb289009dffd2bf17b01f0d4acc870f9209a8a2e7eb08effb07456f9e9ea3ab8138e988c50560e86345983e633c5f5d5a9e355b79dba0a9c9152dd268a677250023aa36133bb12a3c8ab4efd2bdaaede369427e585419c66a17c9a0c56efb76721321eaa1a5c767ed4e9f11f8d23c858a716a8943850c4bc670d93840b8703dc3b08e9344cf0459ea80c891500a1a1b8b0fbfcf651c6b6740db6e7e2d5d10566d20a8a3081a774c68345625d40de26600803cf4b543c9191f9adfdb8785d905f56e287320bf03de44759b21a9085f1b3b661626d62fff5fdc881776dc75ce8e66f50476539e6e7c50966a4fd8ab8f161bcaadf701644fe26c7be7886b6c71604badde9634aeaca4cf531e9f8874a472c7ac566221fdeeddaf84631e25dd1d2c17877d2b35460330e4a39228b01e1e0b19688ff865c5803b2981828813151d97b560533341d033c400a370a21d144a99108367424a224f1ca1d16e1d1969a3b198a83ddfc41ccae8b165fc29f820f0fb0688f4a4c1d09953b9e1543bad9b4f66ee6b07a9603433cc8386d7c2d35b0ddd4ec5b80ef1e64162326a63835c680eee2234abaeeca83bcc45e73ba12dd9ebbc5cf0ae90b55ad3214b70bebaf627ffef4462885a350ed2eb621345dcb7804f985182c1cb8ba7a562f2c3709db780c06e8ba29ddfa89a32fa9d005eafee70c704ec57668b1e0b9188a512bd4db102316b619f9f6a644ceeda6bf52a79332aefd5350a28f272b93760eca81baba1f1c3eaa543262c63de7ba6150a61f3c298d07b03b557e8d37257658bae52878322f662da0fcb9768a7570204df80b12bce014b82cd30d40c80695d94f42837f48d76d74b9a8405411de266ccc0deb8eaa07936ba404a24cbcd0bc5eff6d59ac89bcb7233ef11baa921b8fd995220b7780cf9aa0524c6808400ddfde1b0593f694a810e00f9fccc4aa2117eede75a35410655f25764b30403066fa5e40e88010f294f5ecf7edb50367dc2c16feb82b78d33ac8961aeebcbdf4259995c3b4b859427be1348df15059a8f008fe3bb54c0a8d29b4c7e4b7103fb140273d50c7f8b0dffc6352494fa6fa59658f9bcfb38925b936932eb9d9354ad2e660d754bd0b1fe0c2fe4445e7d48b175987cd688cac5b4000cfe51bb6afc5c633d572e2c813d6891263770072bab8641efa7fbf5fd2b331239122c8706cdfbb88ac37eeb68eb1d9c2e4cf961636482b82538b1b293b0ab98003d83a1fda50330fa91eb30df049607cd90bd386c806bcefdef69811f86b9e7a6e4dac3e8767f295de17e1cda34cd95a3af0b58570851b8c5dea151537754b4e39291683b46ef99beb24f5b05749fe4b8ee9b94447820cdee200be0388021002455e6c4229c20d0d17ba2c4262f53dc999bf569574cff130edd1f33fe1ee0a2050cd901ee06ecdcf233fa463eb029b7c1be8129fa5eac37e0475b11adad65f8bc2225d225b0ca79b7a4697bb62fb95a83ad9473f7c963801ac820ba2788324da48066062909f056d88b3f46268145756f98a1ef9b13968f5dda588cdb70ad3095138ed7934ab617ca94bab942af2d657d9ab1cbf26b19e992f5b8a8659b150d7264572153d61eba1911e1cc5e35a26f83a581a9ce60837ed60f9c4c23a29c6682d14515203ff2c233889ebc09a2a9af4a81f4a65a501ed72c61c1fecd0502cfe0267c3b2d6489ba1659d2c9894704ca8b2f2c156d7d63d2008b732e14ef15181a722fe6b90f452c93de17e17b011ced725845f87ecbbdd8cd6acdc37c9e3b4c869ebfbce9dc4cdd11f08e7973676962b00606d5ce38a8fe5bdf1b547c80b77ea91922342dfd651bddc456e312bdd6b5578ca101235b2e8c3a278fec32436265e3e45c803fd70cbd1976046c40bcaff061ed607c0cc498f1e6bb469306ce54e0c2ede412f39727990233e6d818e86f7465baa8894638e00f11868ff34b9d429797693845209f9a80f60841895a63a845f1b7c2d56a054cb636ef99ab911336af6ed561eca52bc4c1d6043b1e8a8c33c39df2d870c0a781e16a2f7e9ce73db5e2c27608fb735508a89aaa4d29eaeba2311cda87dfa0af1caef3c70c667935e005080fd129bb71ad5e64ebbb5332aaf6e2a9d8ab9b6625de431cfc60376734e9c3d14d1b2d6efef51bba4c86a7f84a33dffb91f717c43a9511bcb242e1f0c71c4cf4426e421cbdd267b0ab3a20c81b646f6d44ae67ad4ecb533ce8a58f6434befb0b3d50c49d432cff07ddebb61b8520fb01d84db3cc3fea1a9a38aa028b205eb4fd3aef4e82f9a18a25e00185442f85169e4317de719fce08e05e4594857de12c978b8cce3911b298b47b01462205f8c6442cdc2f0f841fb44817c268118cb14dc658beebde5b5b24417536bf2dd689a6480fc5fd003cba219b2f91178e38bcc9d62cca6bbb77be4b7625e9c14b15a3327c7342fb668d3e9b9e5352b2c5fff8159573fcdbb5be6936bfd4946b9c1ba464aa8ab8a08a3ef0846e0038dff5ce1178b3eeeecbdb58e812ccbab86ad910e43344c6f3757e8cd6217d7b4b54acfb19140578cd247b4df5ab6b8f7bcb29f592a77c2057dcbf808fd3f223d94f0fde347fe29d2a6877f37a5e3254ca2091802130535136cf905b1cf96ad4a1685456d2a69ac0943790181dfb0b28b11d69f4830fba0310bd872bf7fc6940357d05fbae2e2fc17845dbd6bbabcd374258525b3338b8388cb029689decbf43673489856bdbaba0ac1b071b41382b4c830224c17d123a26d5cab0774c42e088093c8d82b74b942c22b89428d5bd558207a900feac22837fb510a49c87cfd20618355f8eac3b9bb4b8639a000d35a3dfdcad166d45eacc584866e00174a0265980257fd2ca12390c775ecb4effc688aa1ec26b2992af6b8c5faf735d3a52424a56a0a78ef3a6aa4dc167cb863570cbcaa4353f4e2c35ef8d586dd498fce87278f5f50009fa9ab64d4a134d6cdff4beae760cfa06c0de578d39918d5536965b928b31547a44f37d6e7fa4ce8576d645f17c99b28836ce3891d758722529d9ae4d09a2e48641775129462c7a5993a8a8a461fe996a6b1c73dd292593a72af89472c6a68c10563e7609fc29f35568a5c9aafa82b9aa806cb4f954785bf136db71d54f0f2383757a4c297458c451017123e20d4d6c1298568fab0a93576230b61b9a168c27e22a43ad104def2156343c4bd44c3a3a5754f16778e4c7e7bab5564c6648ee3ac8ba0b438a4426c23c26b6155c18aefc08781321ff09779a85709bf51ac1adfb28f368dc35f81b2631a8b0772b0ba2b64bc1701aed4827f40a22d4c41e7d6a353863c2a8eb680e2b3ecebbbd07e39111a46ea5256fedd4513df14df4f68d6cdb0c7f74cd465914ea7568035114fc654239ad88b970e4fd31a4a7f35290462894cb9c3c4605b552a667d0956829183297772dbd98a90605ad0a2c86cc81f471dccee94db99e45a0180d055c4c5e935727ae40aa90acd88d85104fd27a6a124ed98c501b2c4930e49078ed410323f2b904a692307e5de7fb84bb4e6bb2586013491b41c81808f1e669120efded5ef369e75a1ae37c3ac07757bf43f37fb208d6c0a53200911394ebe328f3e0a3d0696dafb7daf5311855f49d0e7e073e1e98a530b4540c3f43b79d9f7043c51dfdc3c2aba74a76e892469db7ae017bb790616a3162865d24d250e328013fc5b4a0cc94d77a23301af1524910a0def4153d2c6364dbb7a7b19ccdb822510479f713b9f9956dbceb012cf5cc7224c8aa4da8b4a4f335df57d57ad7b083671573bef7c68677c1018cc99e7389eba250430d5e1f193c9211e40be2bc53728cfeeb34438eef779dac41dbf32fd3f64fa460efd890e8d26ca1be190f51a712fbe795c4f604c5d70f5a89ac04a2a30aba519b8e0cc5d73f451ee35ac48962551763f7101357f97db437b4a6412e848d940ba370b4057f793e9991ec7864b4cdbf640d9e7934c2804012e7f9e68befdd190364b5f2df8df02532271fa67019469f80a2e94c6c05b8c90be3b849d70e00cf275f603489eaa4d6ebf887358168f4ebea4c4f04cb9bc28653edd5099a379dde588c2cfd8f065c928566bb5f1814853657f3502deb296bddeed9a6bb13683e93edfa94b9c1b52189d69820fa481cfe1ad540d6594a6aefb5a5f9441ea2ccbaa63cd9923c61fbbedb84aa7732ad9ec8b95e0d4af1f030beaa373654f8b60e9163daf3e2c2af69fbf7127987340819485e52f574eb3dd3217ff45b2ffd0c834bbaef39260b1f9991734ba18f6257480adb50b9c5a73f5d4e6d03b68c60ca37", 0x1000}, {&(0x7f00000054c0)="9e3079048534c86602f152ece1479293f05702040c2d2ebae9293ec506e9c41c92de78b1c80e4ed15c3e3029ca1c67cb5a0688a8abe4348255b18406a1f5d5950b32fa495fb520fa9123eca93041210fcd15bd539d7145beb9673248acd92738de6afe57da8b41f586e50169f57d6090befb5c956a3ebd3787b67f1153b623043e", 0x81}, {&(0x7f0000005580)="e9d31cddbfe92e1d5e59b3d881580bf757", 0x11}], 0x6, &(0x7f0000005640)=[@rights={0x30, 0x1, 0x1, [r0, r1, r1, r0, r1, r1, r0, r1]}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r1, r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r0]}], 0x78, 0x4010}, {&(0x7f00000056c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000005b40)=[{&(0x7f0000005740)="6096ddd2079cbc45d6b8e213a67c017a3e1109a09d298f310801d7cad607ad90eb612dad30ec91975b9200154002ec42eb5a1e5d18e4c07bf060510e9848b43cc46c6dd37307f4fdd174a7dde482bfd89637f3df3092ecdf99cf7802398f6c18e4acb157d57c769f1ea85a0942d2ccd4d7b866e8134e80ea2a5266af760e68f60c398c1b465243dc6958ae38651a2ebed52cb33ec9c2d317b0de50a5e096fc79998c457de433195bcc53dc7fcb8d59d29664f574ee3c235b63f05fa75df02a9a55a3a727e27dee8ce5e8a3a278f46d5a8300e1b93f80422043", 0xd9}, {&(0x7f0000005840)="87f3acd08cebb54ce5919bd386022163e8d467cd9ea9268698ee09642dcafa48c7feb3de02f39799ffa136a0c031fb4ef9a5e68aef6c4d90718bc951ddceac51030eee98ff951351e0fae8947fe6aefb1ce879d36836273abfe991e75072df3c7748eda0", 0x64}, {&(0x7f00000058c0)="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", 0xfc}, {&(0x7f00000059c0)="a163a218b51ebaca5d327f7fd841c4aae05aaabdb2e1a35d20f5781169c7b828b7dc7d7067eb516847a8d6f893ab1267d919408aca915b9f6e10365701aeaed6fe190181", 0x44}, {&(0x7f0000005a40)="f38c719a137f8aeb58dc0632ce858a1151cd9b2fa93ca23bc47d0a41e57edc0d14c95880ea492e84e31ff8f844a6b5482fb588d1499b411ed7ff646d48834039a44c60118731d5df756b817904d97ecb9d844ba9446918f216f5f239bc7c1df4b51f9d6735af71aa7a660bbb1d8fdf61e0f4a2652fa28f2ccc1a1f840946047f56c6f3685807d3f2ab9c7c9124dc102051b5ab12c3f90eb703ecc0a5ad591029d700376723bda160c4591c63527e98090b2778f5ad565e283b33d9184c1031bdeb456683", 0xc4}], 0x5, &(0x7f0000005d00)=[@cred={0x20, 0x1, 0x2, r45, r46, r47}], 0x20, 0x80}, {&(0x7f0000005d40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000005e40)=[{&(0x7f0000005dc0)="6deffc30", 0x4}, {&(0x7f0000005e00)="36f4f9da06824312fced6a2084b325da851d0b533f7a81160c2654c16ba8ac44fe50d78bc7778c0dd84f9a38d49325", 0x2f}], 0x2, 0x0, 0x0, 0x1}], 0x9, 0xc000) 2018/06/05 09:48:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) set_thread_area(&(0x7f0000000040)={0x7, 0x1000, 0xffffffff, 0xf59, 0x6, 0x7, 0x5, 0x8000, 0x1, 0x3}) fchdir(r0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x7f, 0x2) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x6) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 2018/06/05 09:48:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000001a0000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:08 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020200000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x10) 2018/06/05 09:48:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x100000000}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1000}, &(0x7f0000000380)=0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x5, 0x2000) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x2, 0x2) connect$l2tp(r2, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x2, 0x2, 0x3, 0x2}}, 0x2e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000001300000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:08 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000040)={[{0xfffffffffffffd23, 0xff, 0x3, 0x8, 0xc8e6, 0xffffffffffffdc1a, 0x4, 0x8001, 0x7fffffff, 0x5, 0x3f, 0x5, 0x4}, {0x8, 0x200, 0x2, 0x8, 0x4, 0xec, 0x1, 0x3, 0x7d1, 0x80000000, 0x100000001, 0x8, 0xa40}, {0xbe, 0x3f, 0x0, 0x7f, 0x1, 0x4, 0x4, 0x8000000000, 0x1800000000000000, 0x8, 0x6, 0x0, 0x10000}], 0x5}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 2018/06/05 09:48:08 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff0200130002000000007fffffff000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}, 0x10) 2018/06/05 09:48:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000400000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) clock_adjtime(0x7, &(0x7f0000000180)={0x5865, 0x2, 0x96000, 0x9, 0x2, 0xfffffffffffffffd, 0x1ff, 0x5, 0x3, 0xfffffffffffffffc, 0x0, 0x8000, 0x7, 0x3b1, 0x9, 0x2, 0x6, 0x8, 0xd788, 0x6, 0x7fff, 0x5, 0x5, 0x5, 0x5, 0xfff}) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:09 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000001000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) unlink(&(0x7f0000000180)='/\x00') fchdir(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@empty, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, 0x7, 0x400, 0x10001, 0x500, 0x8000, 0x7000380, r2}) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x4810, r0, 0x0) 2018/06/05 09:48:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf303]}, 0x10) 2018/06/05 09:48:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btr\ns\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010020000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000200000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x10) 2018/06/05 09:48:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001fbffffff00000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20080, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:09 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300027fffffff00000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) fgetxattr(r0, &(0x7f0000000140)=@random={'system.', 'vfat\x00'}, &(0x7f0000000180)=""/173, 0xad) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x80000, 0x0) close(r1) keyctl$invalidate(0x15, r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000980)='/dev/snapshot\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000a00)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x1c, r3, 0x330, 0x70bd26, 0x25dfdbfb, {0x3}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r4 = socket$bt_cmtp(0x1f, 0x3, 0x5) recvmsg(r4, &(0x7f0000000200)={&(0x7f0000000100)=@can, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=""/59, 0x3b, 0xff}, 0x1) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) r6 = dup(r5) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r6, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x40000000000001ca}) rename(&(0x7f0000000180)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="627472667305", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000034000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf1030000]}, 0x10) 2018/06/05 09:48:09 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x2000000089f2, &(0x7f0000000000)={'ip6gre0\x00', @ifru_data=&(0x7f0000000080)="687ab2f10a163f7a72578274bd72482e5ab35c2e3c040f8707e13b8bd438c0ee"}) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000007fffffff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020400000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}, 0x10) 2018/06/05 09:48:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)={0x7, 0x7f}) fallocate(r0, 0x3, 0x3ff, 0x2baf) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x1) 2018/06/05 09:48:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000001"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000100000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x400001) ioctl$TIOCCONS(r1, 0x541d) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./control\x00') 2018/06/05 09:48:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}, 0x10) 2018/06/05 09:48:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x725, 0xfffffffffffffffc, 0x0, 0x37ffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x10000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:10 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000400000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000002000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x100, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) 2018/06/05 09:48:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4400000000000000]}, 0x10) 2018/06/05 09:48:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000200000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020003400000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 0: r0 = dup(0xffffffffffffffff) openat$cgroup_int(r0, &(0x7f0000000100)='cpuacct.usage\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') socket(0x8, 0x80f, 0xffffffffffffffff) splice(r1, &(0x7f0000000040), r1, &(0x7f00000000c0), 0x2eb, 0x2) 2018/06/05 09:48:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000020000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r1 = geteuid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0/*ile1\x00', r1, r2) 2018/06/05 09:48:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010400000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03000000000000]}, 0x10) 2018/06/05 09:48:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x1, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f00000000c0)) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000040)='./file0\x00') 2018/06/05 09:48:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf8ff010000000000]}, 0x10) 2018/06/05 09:48:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010200000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r2 = dup2(r0, r1) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000140)) 2018/06/05 09:48:10 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020002000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) fcntl$setstatus(r0, 0x4, 0x2000) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 2018/06/05 09:48:11 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667304", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000fffffffb"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}, 0x10) 2018/06/05 09:48:11 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000020000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x41d, 0x210000) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/65) 2018/06/05 09:48:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) statfs(&(0x7f00000001c0)='./file1\x00', &(0x7f0000002400)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000480), &(0x7f0000000640)=0x4) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x402000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000100000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:11 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000002000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', './cgroup\x00'}, &(0x7f0000000100)=""/78, 0x4e) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfa030000]}, 0x10) 2018/06/05 09:48:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f00000000c0)='./control\x00', &(0x7f0000000100)='./file0\x00') 2018/06/05 09:48:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001fffffffb00000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:11 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000200000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x10) 2018/06/05 09:48:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010003400000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:24 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:24 executing program 0: r0 = dup(0xffffffffffffffff) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000340)={0x0, @multicast1, @dev}, &(0x7f0000000380)=0xc) lstat(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c000000280000042abd7000ffdbdf25000000005ce2debf59da450c8d", @ANYRES32=r1, @ANYBLOB="0f00100006000a00ffff0a000800050001010000"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf103]}, 0x10) 2018/06/05 09:48:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010040030000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) sendmmsg(r0, &(0x7f000000ac80)=[{{&(0x7f0000001240)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000001640)}}, {{0x0, 0x0, &(0x7f0000002bc0), 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x2, "4bc333b81b8776f310863be08e4068346a"}], 0x28}}], 0x2, 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:24 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000400300000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:24 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000020000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = dup2(r0, r0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast1=0xe0000001, @loopback=0x7f000001, 0x0, 0x5, [@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0xb}, @rand_addr=0x1000, @multicast2=0xe0000002, @multicast1=0xe0000001]}, 0x24) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000002"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:24 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b]}, 0x10) 2018/06/05 09:48:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000100"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:25 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000004000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:25 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}, 0x10) 2018/06/05 09:48:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000017fffffff00000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:25 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x80000001, 0x4) 2018/06/05 09:48:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x200, 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:25 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000010000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000004"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x10) 2018/06/05 09:48:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000020"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:25 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x200, 0x0, &(0x7f0000000100), 0x0, 0x0) 2018/06/05 09:48:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b000000000000]}, 0x10) 2018/06/05 09:48:25 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000001000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x100, 0x1) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000001000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:26 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff0200130002007fffffff000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 764.526392] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 2018/06/05 09:48:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000004000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x4a0200) poll(&(0x7f0000000480)=[{r1, 0xa553}, {r1, 0x7186}, {r1, 0xc016}, {r1, 0x6240}, {r1, 0x8000}], 0x5, 0x3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e20}, @in6={0xa, 0x4e23, 0xfffffffffffffeff, @dev={0xfe, 0x80, [], 0x10}, 0x8}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x800}, @in={0x2, 0x4e24}, @in={0x2, 0x4e23}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e22, 0x1f, @dev={0xfe, 0x80, [], 0x1c}, 0x80}, @in={0x2, 0x4e23}], 0xc4) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000400)={'filter\x00', 0x0, 0x4, 0xee, [], 0x9, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/238}, &(0x7f0000000380)=0x78) 2018/06/05 09:48:26 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x10) 2018/06/05 09:48:26 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000200000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x36b) 2018/06/05 09:48:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100fffffffb000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:26 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:26 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000340000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x10) 2018/06/05 09:48:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x7, 0x0, 0x57, 0xfffffffffffff801, 0x3, 0x100, 0x0, {0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x2, 0x5, 0x5, 0x3, 0xfffffffffffffffb}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000002c0)={r2, 0x506, 0xffffffffffffff7f, 0x81, 0x7, 0x41, 0x0, 0x3, {r3, @in6={{0xa, 0x4e21, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x40}}, 0x9e, 0xb0, 0x7fffffff, 0x1, 0xbf9}}, &(0x7f0000000380)=0xb0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4000, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0xfffffffffffff001) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) 2018/06/05 09:48:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001007fffffff000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:26 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff020013000200000000007fffffff0000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x4) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:26 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) 2018/06/05 09:48:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}, 0x3}}}, &(0x7f0000000600)=0x84) clock_gettime(0x0, &(0x7f0000002200)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002180)=[{{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000840)=""/56, 0x38}, {&(0x7f0000000880)=""/238, 0xee}, {&(0x7f0000000980)=""/120, 0x78}, {&(0x7f0000000a00)=""/81, 0x51}, {&(0x7f0000000a80)}, {&(0x7f0000000b00)=""/64, 0x40}, {&(0x7f0000000b40)=""/4, 0x4}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/211, 0xd3}], 0x9, 0x0, 0x0, 0x5c5}, 0xffffffff}, {{&(0x7f0000001d40)=@can, 0x80, &(0x7f0000002100)=[{&(0x7f0000001dc0)=""/254, 0xfe}, {&(0x7f0000001ec0)=""/3, 0x3}, {&(0x7f0000001f00)=""/167, 0xa7}, {&(0x7f0000001fc0)=""/88, 0x58}, {&(0x7f0000002040)=""/173, 0xad}], 0x5, 0x0, 0x0, 0x8000}}], 0x2, 0x10000, &(0x7f0000002240)={r2, r3+10000000}) recvfrom(r0, &(0x7f0000000800)=""/40, 0x28, 0x1, &(0x7f0000000280)=@in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000640)={0x8, 0x80, 0x202, 0x3, 0x7, 0x7, 0x70734a99, 0x40, r1}, 0x20) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-camellia-aesni-avx2\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe000225070097c11ed4c2c4dc42ffa86eb9", 0x30) sendmmsg$alg(r5, &(0x7f00000004c0)=[{0x0, 0x0, &(0x7f0000000480), 0x1ea, &(0x7f0000000ac0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@sco, 0xffffffffffffffd9, &(0x7f0000000400)=[{&(0x7f0000000300)=""/81, 0x51}]}, 0x0) syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000001, 0x20000) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20400, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="f0b3247ee84d8b1c074e715fbb79aa55bae09507fc86df203344e9ecb732484b54cc14a3fb6e397dbf09be7555ad7164e7a4eade48ee0bb28572b965493800873aa911e1daedddd991ac4101fa9149004fc1d933c058440706be31390b808f8822b8140a58462f80abe8f84a6bafe399a84d541734e6b45004ac3f17ceaec6d22f4ccf7e405b3c843c05addabbef6aacee337f3d99a9245bfd385b218f", @ANYPTR=&(0x7f0000002440)=ANY=[@ANYBLOB="6b00cc1b1c1463a84c96f7a619d2081cbcb2c2ee9a04f45f446a764bd2d6e5496685c1b34a1f3783b3801cf40adbadd128178a015fef2a8eac57d68a8f23f3678718fa52cc9eba2cbc1ddcb84c50f5800746dd4757345b63f79b8206effc4d323162661ed833a9e2bb87053e5a9c0b117ba02d36a72a7e8637fdb77e0892d71870afa4fc997d1c7db0e5315798d458e7021d86fb5cc0385c0a644e72292eaced2778cc9706e183d8e8fce0e4a7a6c470de6b7f466880ed0f299e", @ANYBLOB="c4dea3d2c2ae65ec1551ce9bc9edcd2931ae3244264146b279ba464c3c7910f5ec6db991c28a002456eb0be83243db7466d36c450d48b4497c58f930d1b2fce8a80aa68ed2508d85f998c039ae8b82b3490b8ac62f6975d829538021d0d119b4326b90ca4c2af62bb577e53016237e85a9d4be6c3db4b771969d83ad4cbfe7e5496fd69449f3fc450a421a863b02bbd2e9f07954a7164571c5f4b1db04c15f7d96f0b839d9cc3500fa58fa11d8c37c4367a5daabc896ef23bedfa584eb854458498b6fe6de3d2c9c6793e4ef75dad7062e78cfd9412751a020a7e34dd06cf8dd4aef6116", @ANYBLOB="88ace7fa9d30adb5453e81ff6d27e22e7913f14194606ec2e2c9f609c4b0a22f9799a3d53a3ae9f61e17ff302dfbfce69b86537f25450f2a75d4065f9670d36fff253abff9991515569d4f6046db749eb080d12926890b3913542d3b228629a0434dfd75897a4e8229eab49ec5c9205221062af9e06abd359c887b22b36274e27d66337f79b52976f5ee2dcd", @ANYRES32=r7]], 0x2) fchdir(r7) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x20000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) fallocate(r9, 0x1, 0x100000000, 0x6) ioctl$TIOCEXCL(r8, 0x540c) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') ioctl$KVM_SET_SIGNAL_MASK(r8, 0x4004ae8b, &(0x7f0000002700)=ANY=[@ANYBLOB="52b3b60864e70f279f734bd8025d72c51daf69b082fc91f0030000007878b2a3468a73b09a8051d3c274611839a5880c6bc4efcde6d996d3f930f8101da6a3a5e27d4f67d59f5bdef2a562880cdfc170543c6fa838d537c124cee982f7dd08ecd2e6d8b5d8000000000000000000"]) syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x4000) ioctl$EVIOCGBITSND(r8, 0x80404532, &(0x7f0000000240)=""/29) recvfrom(r8, &(0x7f0000002300)=""/187, 0xbb, 0x20, &(0x7f00000023c0)=@ethernet={0x307, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) statx(r0, &(0x7f00000006c0)='./file0\x00', 0x2100, 0x222, &(0x7f0000000700)) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000680)={0x87, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x4, 'sh\x00', 0x30, 0x8, 0x3d}, 0x2c) 2018/06/05 09:48:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000]}, 0x10) 2018/06/05 09:48:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000001"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020004000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) accept(r0, &(0x7f0000000140)=@in6={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x80) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_int(r1, 0x0, 0x53, &(0x7f0000000000), &(0x7f0000000040)) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x4002, 0x0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 2018/06/05 09:48:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000340"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000040000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 0: r0 = accept4$ipx(0xffffffffffffff9c, 0x0, &(0x7f00000000c0), 0x800) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./control\x00', 0xe23a, 0x6, &(0x7f0000000640)=[{&(0x7f0000000200)="22986e75297a76717cec9b4cada61b216d18d2038586b895ec38a37d02396db2412f3a188dea61e66d8f748f23b6a7c9a7cba4f6b8d4c51e4f70c1960fc9afe9aa1cd96bf3d2169e17e27de73227ec06c340ea07fdcec5dbb3113005fbc7f466b01a035896aeb3d6312b382b5c500799e46b5f84783f274c182df8116bb89261fcbea489e7c19ea2af93b4f9a94733973ee11032b0b6ad3e9b1aeb94b43e800264547e9ec948c1e49dcc610338b96e1cf988d9e0397b43", 0xb7, 0xb091}, {&(0x7f00000002c0)="735c4def57bfe3be793bbbf05e35afa04e8b5caaa3c2f97835e37d35f13c344f32e5a6e2477d361115b732260aecaa227c6e1a686e401157c57fbe6d8b4eb419f3c00eee7afad90f19ca3b750b4b36a1a48f4c7d164c5c4931c42f69474c71177b0dacba24712e24e9caa4fe20d2c6784b8aed5b662ca85c32a6d9f9c14f53db172387a5be416225486471b3f416620eb8c1922e192fcbb6b10e070f4ab856079daee7be", 0xa4, 0x4}, {&(0x7f0000000400)="93e71ee53039418ff367af7d881e0531121ad9a7debdd2dd57013f5a3baab7a13fb965656109374e0f81ada5d73cdb3ed6a8556e6870ca3eb1c0e33f40e86918fa0a135cc4ed4c3b885507fccf9f174280b339c982947be3930b29d338f2c8f504fea723423306e351548a25cfbfcf26a20ae0f5514ff492c2c380bfefd5e34b4a3e97c8b651c51d79b6815c43550f72d1fe0d985909e416a01c0a7a26474e24ad4e76e3ea0f0a7051b022cfc392ce7838c9335c8d49859c90c7ec1b", 0xbc, 0x28}, {&(0x7f0000000380)="651d18d548be2c46bafe7d7a1898794a3e16ec10534bf06e8a527b4452350878ba060a432d2d435eb2f58b86c3981bac38fa7c2deb", 0x35, 0x6}, {&(0x7f00000004c0)="febcad2b6c266edaa0346e77c9b80c9302becc55d0265f745a1dddc996eb18939455c8c1a24fa961c8962cc75eaaac6b4eb009694e0f7ee3a341e2984bbdb9bac371fd945b31a95ad13c7f85bff351186e13", 0x52, 0x2}, {&(0x7f0000000540)="a4d13709dd2dfad7429fd0bbd3adeef3ff5cd23276eb65ead960bd90092000d78fcb12f32dd46273c9cfea3d7833326026427871be5a09c1780088be992d0bd063e7c27765f910b612aa8b6c2a91e2e3c44f1c5f603b14e22c93027ef3885e6c585fa970068e3dce8a6997fee2fcdbd4e1463489e5930788c44cd3e45d849702bfb8903b6358cfb6b0a02285246dbb850679c28b01c650d139b1de83bd92aec61831a7281c6ecbc0c7fccfe3514ddd8ac9ab015900d5dc7c826703f99c83a17c875a58e0a5eea2d73800de9e1b4872ea62b6840a71f21dbe6c8d1617147d66cce86e556d2983f310dd01a41fcb5dc83f75", 0xf1, 0x24}], 0x800000, &(0x7f0000000740)=ANY=[@ANYBLOB="4b6e50757569642c6461782c6772f071a72eb34e6ee5"]) fchmod(r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) fchdir(r1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0xc0) ioctl$KDSETLED(r3, 0x4b32, 0x10001) 2018/06/05 09:48:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x10) 2018/06/05 09:48:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/179, 0xb3, 0x2, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:27 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000034000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 765.878481] XFS (loop0): unknown mount option [KnPuuid]. [ 766.012959] XFS (loop0): unknown mount option [KnPuuid]. 2018/06/05 09:48:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000400300000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xbb8]}, 0x10) 2018/06/05 09:48:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e1e63677a6d7570007111e726b8b1a7c321bc8313e482877a4658b9eebe4705105337c6e455efbe0cc676cf79ef97520309e62a3b26c0268e41bdaceacf3fc65d637194498d5032f06d96a5c6f379bb7752d302e39c9b", 0x200002, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffff5ee, 0x100) inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000451) fchdir(r0) r2 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000280), 0x80000) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000300)={0x3, &(0x7f00000002c0)=[{0x200, 0x8, 0x8, 0x2}, {0x1, 0x9, 0x45, 0xffffffffffff0001}, {0x743, 0x9, 0x14e, 0x80000001}]}, 0x10) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') memfd_create(&(0x7f00000003c0)="2e1e63677a6d7570007111e726b8b1a7c321bc8313e482877a4658b9eebe4705105337c6e455efbe0cc676cf79ef97520309e62a3b26c0268e41bdaceacf3fc65d637194498d5032f06d96a5c6f379bb7752d302e39c9b", 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x400000) sendto$unix(r3, &(0x7f0000000140)="4914747e8728c26dcc9c1e18c85377ebaf3c43f9912f2b709ad37a1a90971d2ba51cf25e2a90385fb99c77c445879f9aa46c1cefd07a29dd3234833eada6f395c36d6211a1968fd21b87aaf916b1b3201f0e7ad4751c5058c5daf62a8376e7bc1b556d846efd27dc5a3e6f8bb0073a03664279cc78ab01ce8e28a98cc3d5179faa90c782b11e1ac743f1496377c8fad71a8cf1b734fc153271f6fb90c9a9c475842472124706808a4f43cfae916de5ab03", 0xb1, 0x10, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e23}, 0x6e) 2018/06/05 09:48:27 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000200000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x30, 0x1, 0x1, 0x16ca, 0x100000000, 0xfffffffffffffff8, 0x3712, 0x8}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x4080}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0xfff}, &(0x7f0000000240)=0x8) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) utime(&(0x7f0000000080)='./control\x00', &(0x7f00000000c0)={0x400, 0x80}) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000040)='./file0\x00') 2018/06/05 09:48:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x10) 2018/06/05 09:48:27 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000002000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x1, 0x2, 0x5, 0x9, 0x0, 0x1, 0x1, 0xe, 0x4, 0x0, 0x6, 0x7ff, 0x0, 0x4, 0xfffffffffffffffc, 0x8, 0x7f, 0xffffffff, 0x0, 0x80000001, 0x7, 0xfffffffffffffff9, 0x8001, 0x8001, 0x0, 0x58e9, 0x5, 0x100000000, 0x2, 0x3ff, 0x8000, 0xfffffffffffff395, 0xffffffffffffff23, 0x39, 0x3, 0x4, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x8}, 0x80e9, 0x180, 0xec, 0x3, 0xcd72, 0x9, 0xfff}, r1, 0x3, r0, 0x8) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000200000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f6", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}, 0x10) 2018/06/05 09:48:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x83, 0x0) 2018/06/05 09:48:28 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000040000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000500)=ANY=[@ANYRES64, @ANYRES16, @ANYPTR64=&(0x7f0000000100)=ANY=[], @ANYRES64, @ANYPTR64=&(0x7f0000000840)=ANY=[@ANYRES64, @ANYBLOB="3870787bb799dbf3a7b0ab87360e6fd0244335c82b9b8627746418ec6bae14e1bbed3c29a6d857edc7ea65b025490b27e77f5d71a4d4e9926736f37523c30a1c8386a599fba1bc05c20411ce1cdfd9aae043677ff76e1e5578029ef187547cc400", @ANYRES64, @ANYRES16, @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYPTR64, @ANYBLOB="1b50f0e4f127259da9860789c219f37bd93948e0b3c7f2b288feed13688038757227bfdf5e2e68541b7c65587b35de277811aa453b68423b351805f5f9cadb2cc72b340058d528c9172db60f12c6c8dda453b1acb146117c809d2b9aff3a4497101e6416eab84d1848e8ef7c3df25ea5832fd584a501dbb0b9349e4f6cd9514e73f366dc3df1b0d13d631f9a6d5a689a69da32b6a1814640", @ANYBLOB="7c713f380369f97b524024824bf1be84e7d01d4bf88f600fd263d0d7766f83e5a51282a53544d1e311579c26ce71a5196062267226677153a16275685586e6d8b8cb5bb5e2f5f09148d8c07fe4a8a89ae8fe8b3a1dad526f91b3421daa8458137d5b098104f33aa90fcdbc30305063d82e70d8528895a2c5"], @ANYBLOB="834c14091aee9e4040b52c85ec61c918ac699fa818e47def64e06883eb28cde379acb896976f3cd5b5e75144d9112cba8c38081db0ec7a473b1ce194b13683e796aa903ee34c5e3cd5cc79ee104f681a37c4d7106e78b84e1739fceaf8947ef88350ddd6a4bbbf3bad9ba720dbe6b60f3550733e86fa5e5a3e0752c8e8d87d1447f854c5f80e2115aa56e547cd93bcffddf7ceb23d85b1fecc5a8c99582c43a46e8896d47c59987e14813d20e4f690dbc4be1d88da6e97bad3292c2ba22bc84cfe65514d766c7e3647ca40cfe4ed485b52682170ca499a9840b6e2aff9", @ANYRES16], @ANYRES16, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES32, @ANYRES64, @ANYRES64]]) mknod$loop(&(0x7f0000000100)='./file0/*ile1/file0\x00', 0x20000000000100, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)="07003f881189f16e747300", 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000480)={0x8, [0x9, 0x2, 0x4, 0xe142, 0x3525, 0x6, 0x5, 0x4]}, 0x14) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000380)=0xffffffffffffff7a) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x3, 0x70, 0xbd, 0x0, 0x4, 0x5, 0x0, 0x5, 0x40008, 0x0, 0x0, 0x26a66b35, 0x5f54, 0x3, 0x3, 0x8, 0x8a, 0x9, 0x2, 0x3, 0x401, 0x2, 0x6, 0xfff, 0x10001, 0xd5, 0x1, 0x5, 0xfffffffffffffe01, 0x1, 0x4, 0x8, 0x0, 0x40, 0x9c, 0x6a, 0x4, 0x9, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x9, 0x5, 0x2, 0x20, 0x8, 0x7e}, r2, 0x0, r0, 0x8) 2018/06/05 09:48:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010004000000000000"], 0x60}, 0x1}, 0x0) [ 766.868616] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿÿÿ" or missing value 2018/06/05 09:48:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x101000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x7, 0x4) 2018/06/05 09:48:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100fbffffff000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:28 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000100030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f3]}, 0x10) [ 766.999964] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿÿÿ" or missing value 2018/06/05 09:48:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\n\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000020000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:28 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x111080) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x80800, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="9feb289c4f20d809f0686c05118c44ffdf0facac8d4df1dbef43d397291c51d15441f6da4d21c83335675adf2ed79cdce43467f33f69e95d2201afe30059e6f178cf85475e39cc0c75d5b94c8b9c6fbb9d6d46f91f4e9ba1afd84afdefa5c657cc9fd83ec8ee8fa2356cbc72ccec42d8b6f5f332a67d6406672a", 0x7a) fchdir(r2) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x1, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x1, 'none\x00', 0x20, 0xff, 0x49}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e22, 0x2000, 0xa1a9, 0x0, 0xfff}}, 0x44) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r3, 0x420, 0x70bd29, 0x25dfdbfb, {0x1}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4001) openat$urandom(0xffffffffffffff9c, &(0x7f0000000400)='/dev/urandom\x00', 0x12800, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x6, 0x400) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f00000000c0)="b04140d05e2c984455c81e6ec6b06a7f1b4883a9fd0dbe7570107d04687031c6ae579f10e6", 0x25) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() setregid(r5, r6) 2018/06/05 09:48:28 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000002000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:28 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0xfa6, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x30]}, 0x10) 2018/06/05 09:48:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000002000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec03000000000000]}, 0x10) 2018/06/05 09:48:29 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000020000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:29 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000140)='./file0/file0\x00', 0xfd, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x2000, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) 2018/06/05 09:48:29 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) connect$bt_sco(r0, &(0x7f00000001c0)={0x1f, {0x2, 0x4, 0x3, 0x6, 0x7f}}, 0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x8, 0x81, 0x9}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r1, 0x5}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="2e2f6367726f75702e6e65742f0800a20b00", 0x200002, 0x0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010002000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000ffffff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:29 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff020013000200007fffffff0000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:29 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fb", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$inet6(0xa, 0x0, 0x20, &(0x7f0000000200)) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') lseek(r0, 0x0, 0x1) readlink(&(0x7f00000001c0)='./control\x00', &(0x7f00000000c0)=""/239, 0x42) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) [ 767.900562] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf3030000]}, 0x10) [ 767.960912] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000200)='./file0/*ile1\x00', 0x2, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000500)="218852c16affdba1a37ae55c02da9447e5154db0a6006888e16d45a74f4bdb8bf0234231b0e3696cf44104e1edf47c9aa9b0f34bbb5be8b4f78140167812ec99fa5dbc718fcc2d7908f8a7f6ad4980a9939bd9c7671d210afc5620688e67012191fd1c96278b8fd586e39bb7eb6d93df5afe8a0dd13bf0adf1cdf68317785a2058e67d039e4b064b2f2392ef7ce7c3beb20cc894", 0x94, 0x4}, {&(0x7f00000005c0)="3de5c78e9d8fe0f7ecf21e78aac9c570baba8290a1ef114b8b364cacaef7ec22f91625d7b318b2c1a559c98e254fa02be9b803db82f5bc1b510190eff4fcac6a7288d5c3678b812eaa5e84da6cd568b4f15f02df2ac20b22d9ea2d39ceffc85a8db80b80281c20fc6bb55c0b7e5ab9fdbeb434b8cfb3fb7243d9702ed2fd3e62629fd08089c6283c29273291f3494bfe16c12370d4608057808c8c5b9aac2e76de3c8bac2fee26ebf09701d9ddf4873103251e96938aa26f228497ee1a590dcbaf89fb9320c493726962c06b19e93d210036ff4874130c2687328eef667077425e69cb13c2a27031518f6e9f5a", 0xed, 0xfffffffffffffffa}, {&(0x7f00000006c0)="e16f040af765886fba16f59a96bfc2d40acde436563c3115a572466bfa9ff3ae768bdeb9ef473190275ff5a3089eb8bf249cdcd8876b3594513177c7a742584c771d2d2913d32d42f79075f8fd481abce52b00c20175368b22d135de89208bdeb3419a48236da8e8ba53cd3aa243eb4bf7cd2a4204d8e55788f0609b251f8ea813c5d74abb1a065bd1317d8f5c12ca3e52fa72a4ccbd10bd838d597e035f5b77ddef76885b89fd5d9e256655ffa8894d2a0384ccadd35a9b1c7341aa2482ab9b", 0xc0, 0x3}], 0x4000, &(0x7f0000000240)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x6000, 0x0) statx(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000380)) 2018/06/05 09:48:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:29 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:29 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000020000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 768.171393] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x501502) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 768.241200] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000]}, 0x10) 2018/06/05 09:48:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x101000, 0x0) openat$cgroup(r0, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') 2018/06/05 09:48:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000003400000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000034000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}, 0x10) 2018/06/05 09:48:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x127440) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f00000000c0)={0x7, 0x0, [{0xfb7, 0x0, 0x1000}, {0xc0011bff, 0x0, 0x3ff}, {0xffd, 0x0, 0xec}, {0x6b1, 0x0, 0xffffffffffffffff}, {0x93e}, {0xab3, 0x0, 0x5}, {0xa46, 0x0, 0x817d}]}) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) open(&(0x7f0000000040)='./control\x00', 0x8000, 0x4) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000340000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 768.701102] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf9030000]}, 0x10) 2018/06/05 09:48:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x12043, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001400)=@nat={'nat\x00', 0x1b, 0x5, 0x6f0, 0x278, 0x110, 0xffffffff, 0x110, 0x278, 0x5d8, 0x5d8, 0xffffffff, 0x5d8, 0x5d8, 0x5, &(0x7f0000000180), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x1d}, @remote={0xfe, 0x80, [], 0xbb}, [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], [0xff, 0xff, 0xffffff00, 0xffffffff], 'bridge0\x00', 'ifb0\x00', {}, {0xff}, 0x37, 0x0, 0x2, 0x48}, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x10, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}, @ipv6=@remote={0xfe, 0x80, [], 0xbb}, @port=0x4e22, @gre_key=0x7fffffff}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1a}, @local={0xfe, 0x80, [], 0xaa}, [0xff, 0x0, 0xffffffff, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xffffffff], 'veth1_to_team\x00', 'veth0_to_team\x00', {0xff}, {}, 0x3a, 0x400, 0x4, 0x28}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@tcpmss={0x28, 'tcpmss\x00', 0x0, {0x3, 0x9, 0x1}}, @common=@ah={0x0, 'ah\x00', 0x0, {0x4d5, 0x4d5, 0x80, 0x6, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x2, @ipv4=@broadcast=0xffffffff, @ipv4, @icmp_id=0x67, @port=0x4e22}}}, {{@ipv6={@mcast1={0xff, 0x1, [], 0x1}, @loopback={0x0, 0x1}, [0xffffffff, 0x0, 0xffffffff, 0xffffffff], [0xffffffff, 0xffffffff, 0x0, 0xffffffff], 'syzkaller1\x00', 'team_slave_1\x00', {}, {0xff}, 0x29, 0x401, 0x1}, 0x0, 0x228, 0x270, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x100, 0x4, 0x0, 0x7, 0x20, 0x4, [@local={0xfe, 0x80, [], 0xaa}, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x11}, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @rand_addr=0x10a0000000}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @mcast2={0xff, 0x2, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}], 0x7}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xc, 0x80000001, 0x5, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x10, @ipv6=@mcast1={0xff, 0x1, [], 0x1}, @ipv6=@mcast1={0xff, 0x1, [], 0x1}, @gre_key=0x3, @port=0x4e20}}}, {{@uncond, 0x0, 0x118, 0x140}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x7ff, 0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0xfffffffffffffeed, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0xffffffffffffff19) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/*ile1\x00') [ 768.768530] BTRFS error (device loop1): open_ctree failed [ 768.894607] BTRFS error (device loop1): superblock checksum mismatch [ 768.953286] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./control\x00', 0x145000, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0xfffffffffffffff9, 0x0, 0x10002, 0x8}) r3 = getgid() ioctl$TUNSETGROUP(r1, 0x400454ce, r3) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0x2, r2}) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r5 = getegid() ioctl$TUNSETGROUP(r1, 0x400454ce, r5) 2018/06/05 09:48:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000007fffff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000400030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf8030000]}, 0x10) 2018/06/05 09:48:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667305", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000fbffffff0000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) renameat(r1, &(0x7f00000000c0)='./control\x00', r2, &(0x7f0000000140)='./file0\x00') 2018/06/05 09:48:30 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000010000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}, 0x10) 2018/06/05 09:48:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fe", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000040000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40180, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) 2018/06/05 09:48:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf903]}, 0x10) 2018/06/05 09:48:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001301ff0000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsU', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000003"], 0x60}, 0x1}, 0x0) [ 769.655674] Unknown ioctl 4707 [ 769.681554] Unknown ioctl 4707 2018/06/05 09:48:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000004003000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x11}, 0x8000}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x6, @empty, 0x80000001}, @in6={0xa, 0x4e22, 0x101, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, @in6={0xa, 0x4e23, 0x80000001, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e21, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x858}], 0x9c) rename(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='./file0\x00') 2018/06/05 09:48:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf4030000]}, 0x10) 2018/06/05 09:48:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000002000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 3 (fault-call:0 fault-nth:0): add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000200030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x10) 2018/06/05 09:48:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000040000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 770.170651] FAULT_INJECTION: forcing a failure. [ 770.170651] name failslab, interval 1, probability 0, space 0, times 0 [ 770.182015] CPU: 0 PID: 23266 Comm: syz-executor3 Not tainted 4.17.0+ #84 [ 770.182474] BTRFS error (device loop1): superblock checksum mismatch [ 770.188958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.188966] Call Trace: [ 770.188992] dump_stack+0x1b9/0x294 [ 770.189012] ? dump_stack_print_info.cold.2+0x52/0x52 [ 770.189029] ? graph_lock+0x170/0x170 [ 770.189060] should_fail.cold.4+0xa/0x1a [ 770.189077] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 770.189094] ? find_held_lock+0x36/0x1c0 [ 770.233795] ? find_held_lock+0x36/0x1c0 [ 770.237305] BTRFS error (device loop1): open_ctree failed [ 770.238097] ? check_same_owner+0x320/0x320 [ 770.238125] ? rcu_note_context_switch+0x710/0x710 [ 770.238147] __should_failslab+0x124/0x180 [ 770.257265] should_failslab+0x9/0x14 [ 770.261088] __kmalloc_track_caller+0x2c4/0x760 [ 770.265775] ? strncpy_from_user+0x500/0x500 [ 770.270195] ? mpi_free.cold.1+0x19/0x19 [ 770.274272] ? strndup_user+0x77/0xd0 [ 770.278097] memdup_user+0x2c/0xa0 [ 770.281653] strndup_user+0x77/0xd0 [ 770.285298] __x64_sys_add_key+0x19f/0x4e0 [ 770.289549] ? key_get_type_from_user.constprop.7+0x110/0x110 [ 770.295454] ? do_syscall_64+0x92/0x800 [ 770.299448] do_syscall_64+0x1b1/0x800 [ 770.303354] ? finish_task_switch+0x1ca/0x840 [ 770.307877] ? syscall_return_slowpath+0x5c0/0x5c0 [ 770.312829] ? syscall_return_slowpath+0x30f/0x5c0 [ 770.314683] FAULT_INJECTION: forcing a failure. [ 770.314683] name failslab, interval 1, probability 0, space 0, times 0 [ 770.318050] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 770.318071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.318092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.318105] RIP: 0033:0x455a09 [ 770.318109] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.367310] RSP: 002b:00007f16f0e5ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 770.375017] RAX: ffffffffffffffda RBX: 00007f16f0e5f6d4 RCX: 0000000000455a09 [ 770.382283] RDX: 0000000020000280 RSI: 00000000200001c0 RDI: 0000000020000180 [ 770.389551] RBP: 000000000072bea0 R08: fffffffffffffffe R09: 0000000000000000 [ 770.396810] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000013 [ 770.404075] R13: 0000000000000018 R14: 00000000006f52e0 R15: 0000000000000000 [ 770.411979] CPU: 1 PID: 23272 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 770.419014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.428378] Call Trace: [ 770.430991] dump_stack+0x1b9/0x294 [ 770.434638] ? dump_stack_print_info.cold.2+0x52/0x52 [ 770.439849] should_fail.cold.4+0xa/0x1a [ 770.443933] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 770.449054] ? lock_downgrade+0x8e0/0x8e0 [ 770.453253] ? proc_fail_nth_write+0x96/0x1f0 [ 770.457850] ? proc_cwd_link+0x1d0/0x1d0 [ 770.461931] ? find_held_lock+0x36/0x1c0 [ 770.466126] ? check_same_owner+0x320/0x320 [ 770.470467] ? rcu_note_context_switch+0x710/0x710 [ 770.476175] __should_failslab+0x124/0x180 [ 770.480427] should_failslab+0x9/0x14 [ 770.484401] __kmalloc+0x2c8/0x760 [ 770.487958] ? strncpy_from_user+0x500/0x500 [ 770.492386] ? fput+0x130/0x1a0 [ 770.495703] ? __x64_sys_memfd_create+0x139/0x5a0 [ 770.500583] __x64_sys_memfd_create+0x139/0x5a0 [ 770.504813] FAULT_INJECTION: forcing a failure. [ 770.504813] name failslab, interval 1, probability 0, space 0, times 0 [ 770.505298] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 770.505317] ? memfd_fcntl+0x15d0/0x15d0 [ 770.505335] ? do_syscall_64+0x92/0x800 [ 770.505355] do_syscall_64+0x1b1/0x800 [ 770.505372] ? finish_task_switch+0x1ca/0x840 [ 770.505388] ? syscall_return_slowpath+0x5c0/0x5c0 [ 770.505403] ? syscall_return_slowpath+0x30f/0x5c0 [ 770.505430] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 770.553901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.558747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.564022] RIP: 0033:0x455a09 [ 770.567202] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.586525] RSP: 002b:00007f11fad37ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 770.594247] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 770.601510] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 770.608776] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 2018/06/05 09:48:31 executing program 3 (fault-call:0 fault-nth:1): add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x10) [ 770.616041] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 770.623302] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000000 [ 770.630591] CPU: 0 PID: 23285 Comm: syz-executor3 Not tainted 4.17.0+ #84 [ 770.637639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.647914] Call Trace: [ 770.650526] dump_stack+0x1b9/0x294 [ 770.654215] ? dump_stack_print_info.cold.2+0x52/0x52 [ 770.659449] should_fail.cold.4+0xa/0x1a [ 770.663533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 770.668662] ? save_stack+0x43/0xd0 [ 770.672337] ? kasan_kmalloc+0xc4/0xe0 [ 770.676247] ? __kmalloc_track_caller+0x14a/0x760 [ 770.681114] ? memdup_user+0x2c/0xa0 [ 770.684855] ? strndup_user+0x77/0xd0 [ 770.688676] ? graph_lock+0x170/0x170 [ 770.692511] ? find_held_lock+0x36/0x1c0 [ 770.696612] ? check_same_owner+0x320/0x320 [ 770.700955] ? rcu_note_context_switch+0x710/0x710 [ 770.705912] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 770.711127] __should_failslab+0x124/0x180 [ 770.715393] should_failslab+0x9/0x14 2018/06/05 09:48:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x10) 2018/06/05 09:48:32 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 770.719308] kmem_cache_alloc_node_trace+0x26f/0x770 [ 770.724437] __kmalloc_node+0x33/0x70 [ 770.728261] kvmalloc_node+0x6b/0x100 [ 770.732075] __x64_sys_add_key+0x330/0x4e0 [ 770.736318] ? key_get_type_from_user.constprop.7+0x110/0x110 [ 770.742221] ? do_syscall_64+0x92/0x800 [ 770.746218] do_syscall_64+0x1b1/0x800 [ 770.750125] ? finish_task_switch+0x1ca/0x840 [ 770.754638] ? syscall_return_slowpath+0x5c0/0x5c0 [ 770.759587] ? syscall_return_slowpath+0x30f/0x5c0 [ 770.764540] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 770.769931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.774801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.780003] RIP: 0033:0x455a09 [ 770.783236] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.802760] RSP: 002b:00007f16f0e5ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 770.803779] FAULT_INJECTION: forcing a failure. [ 770.803779] name failslab, interval 1, probability 0, space 0, times 0 [ 770.810493] RAX: ffffffffffffffda RBX: 00007f16f0e5f6d4 RCX: 0000000000455a09 [ 770.810501] RDX: 0000000020000280 RSI: 00000000200001c0 RDI: 0000000020000180 [ 770.810508] RBP: 000000000072bea0 R08: fffffffffffffffe R09: 0000000000000000 [ 770.810515] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000013 [ 770.810522] R13: 0000000000000018 R14: 00000000006f52e0 R15: 0000000000000001 [ 770.858737] CPU: 1 PID: 23296 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 770.865673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.875129] Call Trace: [ 770.877741] dump_stack+0x1b9/0x294 [ 770.881404] ? dump_stack_print_info.cold.2+0x52/0x52 [ 770.886725] should_fail.cold.4+0xa/0x1a [ 770.890920] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 770.896239] ? find_held_lock+0x36/0x1c0 [ 770.900357] ? check_same_owner+0x320/0x320 [ 770.904791] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 770.909830] ? rcu_note_context_switch+0x710/0x710 [ 770.914786] __should_failslab+0x124/0x180 [ 770.919051] should_failslab+0x9/0x14 2018/06/05 09:48:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf403]}, 0x10) [ 770.922876] kmem_cache_alloc+0x2af/0x760 [ 770.927050] ? lock_downgrade+0x8e0/0x8e0 [ 770.931254] __d_alloc+0xc0/0xd30 [ 770.934736] ? do_raw_spin_unlock+0x9e/0x2e0 [ 770.939195] ? shrink_dcache_for_umount+0x290/0x290 [ 770.944234] ? __lock_is_held+0xb5/0x140 [ 770.948312] ? f2fs_init_acl+0x270/0x980 [ 770.952397] ? _raw_spin_unlock+0x22/0x30 [ 770.956565] ? __alloc_fd+0x346/0x700 [ 770.960394] ? exit_files+0xb0/0xb0 [ 770.964035] ? lock_downgrade+0x8e0/0x8e0 [ 770.968199] d_alloc_pseudo+0x1d/0x30 [ 770.972008] __shmem_file_setup+0x1ed/0x6e0 [ 770.976340] ? shmem_fill_super+0xa30/0xa30 [ 770.980678] ? get_unused_fd_flags+0x121/0x190 [ 770.985289] ? __alloc_fd+0x700/0x700 [ 770.989109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 770.994665] ? _copy_from_user+0xdf/0x150 [ 770.998835] __x64_sys_memfd_create+0x2a7/0x5a0 [ 771.003549] ? memfd_fcntl+0x15d0/0x15d0 [ 771.007609] ? do_syscall_64+0x92/0x800 [ 771.011592] do_syscall_64+0x1b1/0x800 [ 771.015479] ? finish_task_switch+0x1ca/0x840 [ 771.019967] ? syscall_return_slowpath+0x5c0/0x5c0 [ 771.024897] ? syscall_return_slowpath+0x30f/0x5c0 [ 771.029834] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 771.035202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.040057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.045247] RIP: 0033:0x455a09 [ 771.048425] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 771.067645] RSP: 002b:00007f11fad37ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 771.075376] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 771.082651] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 771.089938] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 771.097220] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 771.104513] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000001 2018/06/05 09:48:32 executing program 3 (fault-call:0 fault-nth:2): add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x10) 2018/06/05 09:48:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000007fff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:32 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000007fffffff00030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:32 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:32 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 771.248349] FAULT_INJECTION: forcing a failure. [ 771.248349] name failslab, interval 1, probability 0, space 0, times 0 [ 771.259713] CPU: 0 PID: 23327 Comm: syz-executor3 Not tainted 4.17.0+ #84 [ 771.266655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.276028] Call Trace: [ 771.278642] dump_stack+0x1b9/0x294 [ 771.282301] ? dump_stack_print_info.cold.2+0x52/0x52 [ 771.287526] should_fail.cold.4+0xa/0x1a [ 771.287808] FAULT_INJECTION: forcing a failure. [ 771.287808] name failslab, interval 1, probability 0, space 0, times 0 [ 771.291601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 771.291621] ? __lock_acquire+0x7f5/0x5140 [ 771.291639] ? lock_downgrade+0x8e0/0x8e0 [ 771.291662] ? find_held_lock+0x36/0x1c0 [ 771.291685] ? tcp_sacktag_write_queue+0x7a0/0x2d80 [ 771.291715] ? check_same_owner+0x320/0x320 [ 771.329986] ? __save_stack_trace+0x7e/0xd0 [ 771.334312] ? rcu_note_context_switch+0x710/0x710 [ 771.339238] __should_failslab+0x124/0x180 [ 771.343469] should_failslab+0x9/0x14 [ 771.347264] kmem_cache_alloc+0x2af/0x760 [ 771.351405] ? graph_lock+0x170/0x170 [ 771.355198] ? __kmalloc_node+0x47/0x70 [ 771.359168] ? kvmalloc_node+0x6b/0x100 [ 771.363148] ? __x64_sys_add_key+0x330/0x4e0 [ 771.367548] ? do_syscall_64+0x1b1/0x800 [ 771.371601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.376959] prepare_creds+0x78/0x3e0 [ 771.380842] ? abort_creds+0x170/0x170 [ 771.384728] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 771.389913] lookup_user_key+0x49b/0x13d0 [ 771.394060] ? join_session_keyring+0x340/0x340 [ 771.398722] ? lock_release+0xa10/0xa10 [ 771.402695] ? check_same_owner+0x320/0x320 [ 771.407108] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 771.412128] ? __check_object_size+0x95/0x5d9 [ 771.416629] ? key_validate+0x230/0x230 [ 771.420610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 771.426151] ? _copy_from_user+0xdf/0x150 [ 771.430299] __x64_sys_add_key+0x271/0x4e0 [ 771.434538] ? key_get_type_from_user.constprop.7+0x110/0x110 [ 771.440438] ? do_syscall_64+0x92/0x800 [ 771.444420] do_syscall_64+0x1b1/0x800 [ 771.448307] ? finish_task_switch+0x1ca/0x840 [ 771.452799] ? syscall_return_slowpath+0x5c0/0x5c0 [ 771.457724] ? syscall_return_slowpath+0x30f/0x5c0 [ 771.462656] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 771.468023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.472872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.478056] RIP: 0033:0x455a09 [ 771.481253] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 771.500563] RSP: 002b:00007f16f0e5ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 771.508287] RAX: ffffffffffffffda RBX: 00007f16f0e5f6d4 RCX: 0000000000455a09 [ 771.515550] RDX: 0000000020000280 RSI: 00000000200001c0 RDI: 0000000020000180 [ 771.522820] RBP: 000000000072bea0 R08: fffffffffffffffe R09: 0000000000000000 [ 771.530081] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000013 [ 771.537340] R13: 0000000000000018 R14: 00000000006f52e0 R15: 0000000000000002 [ 771.544630] CPU: 1 PID: 23336 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 771.551566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.560933] Call Trace: [ 771.563540] dump_stack+0x1b9/0x294 [ 771.567185] ? dump_stack_print_info.cold.2+0x52/0x52 [ 771.572394] ? __kernel_text_address+0xd/0x40 [ 771.576909] ? unwind_get_return_address+0x61/0xa0 [ 771.581884] should_fail.cold.4+0xa/0x1a [ 771.585965] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 771.591092] ? save_stack+0xa9/0xd0 [ 771.594797] ? save_stack+0x43/0xd0 [ 771.598418] ? kasan_kmalloc+0xc4/0xe0 [ 771.602300] ? kasan_slab_alloc+0x12/0x20 [ 771.606432] ? kmem_cache_alloc+0x12e/0x760 [ 771.610750] ? __d_alloc+0xc0/0xd30 [ 771.614360] ? d_alloc_pseudo+0x1d/0x30 [ 771.618321] ? __shmem_file_setup+0x1ed/0x6e0 [ 771.622801] ? __x64_sys_memfd_create+0x2a7/0x5a0 [ 771.627628] ? do_syscall_64+0x1b1/0x800 [ 771.631674] ? find_held_lock+0x36/0x1c0 [ 771.635732] ? check_same_owner+0x320/0x320 [ 771.640055] ? rcu_note_context_switch+0x710/0x710 [ 771.644982] ? kasan_check_read+0x11/0x20 [ 771.649116] ? rcu_is_watching+0x85/0x140 [ 771.653247] __should_failslab+0x124/0x180 [ 771.657469] should_failslab+0x9/0x14 [ 771.661259] kmem_cache_alloc+0x2af/0x760 [ 771.665394] ? __raw_spin_lock_init+0x1c/0x100 [ 771.669971] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 771.674976] ? shmem_destroy_callback+0xc0/0xc0 [ 771.679631] shmem_alloc_inode+0x1b/0x40 [ 771.683676] alloc_inode+0x63/0x190 [ 771.687299] new_inode_pseudo+0x69/0x1a0 [ 771.691343] ? prune_icache_sb+0x1a0/0x1a0 [ 771.695563] ? shrink_dcache_for_umount+0x290/0x290 [ 771.700564] new_inode+0x1c/0x40 [ 771.703915] shmem_get_inode+0xe5/0x8f0 [ 771.707877] ? shmem_encode_fh+0x340/0x340 [ 771.712101] ? exit_files+0xb0/0xb0 [ 771.715712] ? lock_downgrade+0x8e0/0x8e0 [ 771.719845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 771.725364] ? d_set_d_op+0x31d/0x410 [ 771.729151] __shmem_file_setup+0x249/0x6e0 [ 771.733457] ? shmem_fill_super+0xa30/0xa30 [ 771.737854] ? get_unused_fd_flags+0x121/0x190 [ 771.742423] ? __alloc_fd+0x700/0x700 [ 771.746221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 771.751745] ? _copy_from_user+0xdf/0x150 [ 771.755882] __x64_sys_memfd_create+0x2a7/0x5a0 [ 771.760581] ? memfd_fcntl+0x15d0/0x15d0 [ 771.764633] ? do_syscall_64+0x92/0x800 [ 771.768597] do_syscall_64+0x1b1/0x800 [ 771.772471] ? finish_task_switch+0x1ca/0x840 [ 771.776974] ? syscall_return_slowpath+0x5c0/0x5c0 [ 771.781895] ? syscall_return_slowpath+0x30f/0x5c0 [ 771.786919] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 771.792273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.797121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.802292] RIP: 0033:0x455a09 [ 771.805459] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 771.825117] RSP: 002b:00007f11fad37ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 771.832820] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 771.840073] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 771.847510] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 771.854763] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 771.862043] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000002 2018/06/05 09:48:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000020000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x10) 2018/06/05 09:48:33 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 771.897638] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:33 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000001030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:33 executing program 3 (fault-call:0 fault-nth:3): add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) [ 771.955756] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:33 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100007fffffff0000"], 0x60}, 0x1}, 0x0) [ 772.079370] FAULT_INJECTION: forcing a failure. [ 772.079370] name failslab, interval 1, probability 0, space 0, times 0 [ 772.090739] CPU: 0 PID: 23364 Comm: syz-executor3 Not tainted 4.17.0+ #84 [ 772.097688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.107053] Call Trace: [ 772.109669] dump_stack+0x1b9/0x294 [ 772.113324] ? dump_stack_print_info.cold.2+0x52/0x52 [ 772.118534] ? kasan_check_read+0x11/0x20 [ 772.122700] ? rcu_is_watching+0x85/0x140 [ 772.126872] should_fail.cold.4+0xa/0x1a [ 772.130951] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 772.136084] ? graph_lock+0x170/0x170 [ 772.139907] ? find_held_lock+0x36/0x1c0 [ 772.144002] ? rfcomm_dev_get+0x60/0x170 [ 772.148105] ? check_same_owner+0x320/0x320 [ 772.152458] ? rcu_note_context_switch+0x710/0x710 [ 772.157423] __should_failslab+0x124/0x180 [ 772.161684] should_failslab+0x9/0x14 [ 772.165519] kmem_cache_alloc+0x2af/0x760 [ 772.169690] ? kasan_check_write+0x14/0x20 [ 772.173954] ? do_raw_spin_lock+0xc1/0x200 [ 772.178233] key_alloc+0x41f/0x10e0 [ 772.181923] ? rcu_is_watching+0x85/0x140 [ 772.186111] ? key_user_put+0x70/0x70 [ 772.189938] ? rcu_read_lock_sched_held+0x108/0x120 [ 772.194991] ? kmem_cache_alloc+0x5fa/0x760 [ 772.199335] ? graph_lock+0x170/0x170 [ 772.203159] ? kvmalloc_node+0x6b/0x100 [ 772.207157] ? security_prepare_creds+0x94/0xc0 [ 772.211853] keyring_alloc+0x4d/0xc0 [ 772.215596] install_process_keyring_to_cred.part.3+0x87/0x100 [ 772.221591] lookup_user_key+0xcf7/0x13d0 [ 772.225766] ? join_session_keyring+0x340/0x340 [ 772.230461] ? lock_release+0xa10/0xa10 [ 772.234456] ? check_same_owner+0x320/0x320 [ 772.238794] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 772.243831] ? __check_object_size+0x95/0x5d9 [ 772.248354] ? key_validate+0x230/0x230 [ 772.252363] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 772.257920] ? _copy_from_user+0xdf/0x150 [ 772.262131] __x64_sys_add_key+0x271/0x4e0 [ 772.266384] ? key_get_type_from_user.constprop.7+0x110/0x110 [ 772.272293] ? do_syscall_64+0x92/0x800 [ 772.276293] do_syscall_64+0x1b1/0x800 [ 772.280204] ? syscall_return_slowpath+0x5c0/0x5c0 [ 772.285158] ? syscall_return_slowpath+0x30f/0x5c0 [ 772.290152] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 772.295538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 772.300406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.305608] RIP: 0033:0x455a09 [ 772.308796] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 2018/06/05 09:48:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x10) 2018/06/05 09:48:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x10) 2018/06/05 09:48:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2401000000000000]}, 0x10) 2018/06/05 09:48:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 772.328135] RSP: 002b:00007f16f0e5ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 772.335863] RAX: ffffffffffffffda RBX: 00007f16f0e5f6d4 RCX: 0000000000455a09 [ 772.343148] RDX: 0000000020000280 RSI: 00000000200001c0 RDI: 0000000020000180 [ 772.350543] RBP: 000000000072bea0 R08: fffffffffffffffe R09: 0000000000000000 [ 772.357829] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000013 [ 772.365261] R13: 0000000000000018 R14: 00000000006f52e0 R15: 0000000000000003 [ 772.395133] BTRFS error (device loop1): superblock checksum mismatch [ 772.406920] FAULT_INJECTION: forcing a failure. [ 772.406920] name failslab, interval 1, probability 0, space 0, times 0 [ 772.418396] CPU: 1 PID: 23389 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 772.419655] BTRFS error (device loop1): open_ctree failed [ 772.425331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.425338] Call Trace: [ 772.425366] dump_stack+0x1b9/0x294 [ 772.425386] ? dump_stack_print_info.cold.2+0x52/0x52 [ 772.425399] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 772.425417] ? graph_lock+0x170/0x170 [ 772.460596] should_fail.cold.4+0xa/0x1a [ 772.464689] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 772.469869] ? find_held_lock+0x36/0x1c0 [ 772.474581] ? graph_lock+0x170/0x170 [ 772.478410] ? find_held_lock+0x36/0x1c0 [ 772.482515] ? check_same_owner+0x320/0x320 [ 772.486851] ? graph_lock+0x170/0x170 [ 772.490678] ? rcu_note_context_switch+0x710/0x710 [ 772.495638] ? kasan_check_read+0x11/0x20 [ 772.499817] ? do_raw_spin_unlock+0x9e/0x2e0 [ 772.504250] __should_failslab+0x124/0x180 [ 772.508509] should_failslab+0x9/0x14 [ 772.512331] kmem_cache_alloc+0x2af/0x760 [ 772.516502] ? find_held_lock+0x36/0x1c0 [ 772.520590] get_empty_filp+0x125/0x520 [ 772.524592] ? proc_nr_files+0x60/0x60 [ 772.528508] ? kasan_check_read+0x11/0x20 [ 772.532683] ? do_raw_spin_unlock+0x9e/0x2e0 [ 772.537110] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 772.541710] ? kasan_check_write+0x14/0x20 [ 772.545963] ? do_raw_spin_lock+0xc1/0x200 [ 772.550213] alloc_file+0x24/0x3e0 [ 772.553769] ? clear_nlink.part.9+0x65/0x80 [ 772.558114] __shmem_file_setup+0x304/0x6e0 [ 772.562442] ? shmem_fill_super+0xa30/0xa30 [ 772.566781] ? get_unused_fd_flags+0x121/0x190 [ 772.571356] ? __alloc_fd+0x700/0x700 [ 772.575160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 772.580696] ? _copy_from_user+0xdf/0x150 [ 772.585443] __x64_sys_memfd_create+0x2a7/0x5a0 [ 772.590114] ? memfd_fcntl+0x15d0/0x15d0 [ 772.594186] ? do_syscall_64+0x92/0x800 [ 772.598159] do_syscall_64+0x1b1/0x800 [ 772.602042] ? finish_task_switch+0x1ca/0x840 [ 772.606535] ? syscall_return_slowpath+0x5c0/0x5c0 [ 772.611454] ? syscall_return_slowpath+0x30f/0x5c0 [ 772.616375] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 772.621731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 772.626589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.631762] RIP: 0033:0x455a09 [ 772.634941] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 772.654211] RSP: 002b:00007f11fad37ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 772.661939] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455a09 [ 772.669204] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004baaee [ 772.676465] RBP: 000000000072bea0 R08: 0000000020000318 R09: 0000000000000000 [ 772.683723] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 772.690990] R13: 000000000000074f R14: 0000000000700008 R15: 0000000000000003 2018/06/05 09:48:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x10) 2018/06/05 09:48:34 executing program 3 (fault-call:0 fault-nth:4): add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:34 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000400000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000000000ffff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:34 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673c0", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:34 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 772.816853] FAULT_INJECTION: forcing a failure. [ 772.816853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 772.828795] CPU: 1 PID: 23414 Comm: syz-executor0 Not tainted 4.17.0+ #84 [ 772.835728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.845095] Call Trace: [ 772.847689] dump_stack+0x1b9/0x294 [ 772.851401] ? dump_stack_print_info.cold.2+0x52/0x52 [ 772.856585] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 772.861597] ? __radix_tree_lookup+0x3d4/0x6b0 [ 772.866193] should_fail.cold.4+0xa/0x1a [ 772.870245] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 772.875335] ? graph_lock+0x170/0x170 [ 772.879124] ? find_held_lock+0x36/0x1c0 [ 772.883173] ? __lock_is_held+0xb5/0x140 [ 772.887263] ? check_same_owner+0x320/0x320 [ 772.891587] ? rcu_note_context_switch+0x710/0x710 [ 772.896680] ? __might_sleep+0x95/0x190 [ 772.900647] __alloc_pages_nodemask+0x34e/0xd70 [ 772.905310] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 772.910317] ? debug_check_no_locks_freed+0x310/0x310 [ 772.915502] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 772.920507] ? percpu_counter_add_batch+0xf2/0x150 [ 772.925456] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 772.930987] alloc_pages_vma+0xdd/0x540 [ 772.934956] shmem_alloc_page+0x178/0x2c0 [ 772.939096] ? shmem_swapin+0x3a0/0x3a0 [ 772.943069] ? __d_alloc+0xc0/0xd30 [ 772.946697] ? find_lock_entry+0x2db/0x8a0 [ 772.950926] ? print_usage_bug+0xc0/0xc0 [ 772.954980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.960952] ? security_vm_enough_memory_mm+0x9d/0xc0 [ 772.966138] shmem_alloc_and_acct_page+0x1e9/0x800 [ 772.971063] ? shmem_alloc_hugepage+0x5e0/0x5e0 [ 772.975733] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 772.980911] shmem_getpage_gfp+0x6cf/0x4190 [ 772.985221] ? rcu_report_qs_rnp+0x790/0x790 [ 772.989625] ? print_usage_bug+0xc0/0xc0 [ 772.993674] ? shmem_mfill_atomic_pte+0x1c40/0x1c40 [ 772.998687] ? __lock_acquire+0x7f5/0x5140 [ 773.002920] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 773.007934] ? print_usage_bug+0xc0/0xc0 [ 773.011985] ? __lock_acquire+0x7f5/0x5140 [ 773.016211] ? __wake_up_common_lock+0x1c2/0x300 [ 773.020954] ? print_usage_bug+0xc0/0xc0 [ 773.025007] ? print_usage_bug+0xc0/0xc0 [ 773.029081] ? __lock_acquire+0x7f5/0x5140 [ 773.033304] ? check_noncircular+0x20/0x20 [ 773.037527] ? __lock_acquire+0x7f5/0x5140 [ 773.041752] ? debug_check_no_locks_freed+0x310/0x310 [ 773.046938] ? __lock_acquire+0x7f5/0x5140 [ 773.051162] ? print_usage_bug+0xc0/0xc0 [ 773.055232] ? debug_check_no_locks_freed+0x310/0x310 [ 773.060423] ? print_usage_bug+0xc0/0xc0 [ 773.064484] ? print_usage_bug+0xc0/0xc0 [ 773.068530] ? print_usage_bug+0xc0/0xc0 [ 773.072580] ? print_usage_bug+0xc0/0xc0 [ 773.076628] ? graph_lock+0x170/0x170 [ 773.080764] ? print_usage_bug+0xc0/0xc0 [ 773.084814] ? __lock_acquire+0x7f5/0x5140 [ 773.089068] ? __lock_acquire+0x7f5/0x5140 [ 773.093298] ? graph_lock+0x170/0x170 [ 773.097088] ? graph_lock+0x170/0x170 [ 773.100877] ? find_held_lock+0x36/0x1c0 [ 773.104948] ? print_usage_bug+0xc0/0xc0 [ 773.109001] ? lock_downgrade+0x8e0/0x8e0 [ 773.113147] ? lock_release+0xa10/0xa10 [ 773.117113] ? mark_held_locks+0xc9/0x160 [ 773.121262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.126792] ? iov_iter_fault_in_readable+0x23d/0x460 [ 773.131972] ? iov_iter_get_pages_alloc+0x1510/0x1510 [ 773.137159] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 773.142167] ? ktime_get_coarse_real_ts64+0x23b/0x390 [ 773.147347] shmem_write_begin+0x110/0x1e0 [ 773.151572] generic_perform_write+0x39a/0x6a0 [ 773.156160] ? add_page_wait_queue+0x2a0/0x2a0 [ 773.160915] ? file_update_time+0xdc/0x640 [ 773.165151] ? current_time+0x180/0x180 [ 773.169116] ? lock_downgrade+0x8e0/0x8e0 [ 773.173256] ? __might_sleep+0x95/0x190 [ 773.177220] ? down_write+0x87/0x120 [ 773.180922] ? generic_file_write_iter+0xe5/0x850 [ 773.185764] __generic_file_write_iter+0x26e/0x630 [ 773.190683] generic_file_write_iter+0x430/0x850 [ 773.195434] ? __generic_file_write_iter+0x630/0x630 [ 773.200531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.206417] ? iov_iter_init+0xc9/0x1f0 [ 773.210388] __vfs_write+0x64d/0x960 [ 773.214091] ? kernel_read+0x120/0x120 [ 773.217969] ? __lock_is_held+0xb5/0x140 [ 773.222031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.227645] ? __sb_start_write+0x17f/0x300 [ 773.231956] vfs_write+0x1f8/0x560 [ 773.235493] ksys_pwrite64+0x174/0x1a0 [ 773.239364] ? __ia32_sys_pread64+0xf0/0xf0 [ 773.243672] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 773.249195] ? fput+0x130/0x1a0 [ 773.252465] ? do_sys_ftruncate+0x44e/0x560 [ 773.256774] __x64_sys_pwrite64+0x97/0xf0 [ 773.260916] do_syscall_64+0x1b1/0x800 [ 773.264799] ? finish_task_switch+0x1ca/0x840 [ 773.269286] ? syscall_return_slowpath+0x5c0/0x5c0 [ 773.287663] ? syscall_return_slowpath+0x30f/0x5c0 [ 773.292588] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 773.297953] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.302785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.307959] RIP: 0033:0x40fcc7 [ 773.311129] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 773.330528] RSP: 002b:00007f11fad37ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 773.338224] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fcc7 [ 773.345478] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 [ 773.352732] RBP: 0000000000000000 R08: 0000000020000318 R09: 0000000000000000 [ 773.359987] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 773.367251] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000004 [ 773.375358] FAULT_INJECTION: forcing a failure. [ 773.375358] name failslab, interval 1, probability 0, space 0, times 0 [ 773.386617] CPU: 1 PID: 23415 Comm: syz-executor3 Not tainted 4.17.0+ #84 [ 773.393554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.402921] Call Trace: [ 773.405531] dump_stack+0x1b9/0x294 [ 773.409181] ? dump_stack_print_info.cold.2+0x52/0x52 [ 773.414394] ? __kernel_text_address+0xd/0x40 [ 773.419013] ? unwind_get_return_address+0x61/0xa0 [ 773.423987] should_fail.cold.4+0xa/0x1a [ 773.428077] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 773.433199] ? save_stack+0xa9/0xd0 [ 773.436846] ? save_stack+0x43/0xd0 [ 773.440486] ? kasan_slab_alloc+0x12/0x20 [ 773.444649] ? kmem_cache_alloc+0x12e/0x760 [ 773.448990] ? key_alloc+0x41f/0x10e0 [ 773.452811] ? keyring_alloc+0x4d/0xc0 [ 773.456726] ? install_process_keyring_to_cred.part.3+0x87/0x100 [ 773.462897] ? lookup_user_key+0xcf7/0x13d0 [ 773.467245] ? __x64_sys_add_key+0x271/0x4e0 [ 773.471680] ? do_syscall_64+0x1b1/0x800 [ 773.475771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.481162] ? find_held_lock+0x36/0x1c0 [ 773.485268] ? check_same_owner+0x320/0x320 [ 773.489624] ? rcu_note_context_switch+0x710/0x710 [ 773.494579] ? rcu_is_watching+0x85/0x140 [ 773.498819] ? do_raw_spin_unlock+0x9e/0x2e0 [ 773.503257] __should_failslab+0x124/0x180 [ 773.507520] should_failslab+0x9/0x14 [ 773.511346] __kmalloc_track_caller+0x2c4/0x760 [ 773.516043] ? rcu_read_lock_sched_held+0x108/0x120 [ 773.521096] ? kmem_cache_alloc+0x5fa/0x760 [ 773.525452] ? key_alloc+0x478/0x10e0 [ 773.529291] kmemdup+0x24/0x50 [ 773.532509] key_alloc+0x478/0x10e0 [ 773.536161] ? rcu_is_watching+0x85/0x140 [ 773.540343] ? key_user_put+0x70/0x70 [ 773.544616] ? rcu_read_lock_sched_held+0x108/0x120 [ 773.549739] ? kmem_cache_alloc+0x5fa/0x760 [ 773.554121] ? graph_lock+0x170/0x170 [ 773.557978] ? kvmalloc_node+0x6b/0x100 [ 773.562003] ? security_prepare_creds+0x94/0xc0 2018/06/05 09:48:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x10) [ 773.566702] keyring_alloc+0x4d/0xc0 [ 773.570450] install_process_keyring_to_cred.part.3+0x87/0x100 [ 773.576451] lookup_user_key+0xcf7/0x13d0 [ 773.580627] ? join_session_keyring+0x340/0x340 [ 773.585319] ? lock_release+0xa10/0xa10 [ 773.589319] ? check_same_owner+0x320/0x320 [ 773.593663] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 773.598697] ? __check_object_size+0x95/0x5d9 [ 773.603223] ? key_validate+0x230/0x230 [ 773.607234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.612800] ? _copy_from_user+0xdf/0x150 [ 773.616985] __x64_sys_add_key+0x271/0x4e0 [ 773.621241] ? key_get_type_from_user.constprop.7+0x110/0x110 [ 773.627161] ? do_syscall_64+0x92/0x800 [ 773.631163] do_syscall_64+0x1b1/0x800 [ 773.635075] ? finish_task_switch+0x1ca/0x840 [ 773.639590] ? syscall_return_slowpath+0x5c0/0x5c0 [ 773.644539] ? syscall_return_slowpath+0x30f/0x5c0 [ 773.649497] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 773.654901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.659777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.664984] RIP: 0033:0x455a09 2018/06/05 09:48:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x10) [ 773.668177] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 773.687538] RSP: 002b:00007f16f0e5ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 773.695269] RAX: ffffffffffffffda RBX: 00007f16f0e5f6d4 RCX: 0000000000455a09 [ 773.702558] RDX: 0000000020000280 RSI: 00000000200001c0 RDI: 0000000020000180 [ 773.709852] RBP: 000000000072bea0 R08: fffffffffffffffe R09: 0000000000000000 2018/06/05 09:48:35 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000010000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:35 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000003400000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 773.717146] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000013 [ 773.724437] R13: 0000000000000018 R14: 00000000006f52e0 R15: 0000000000000004 [ 773.753456] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19fff]}, 0x10) [ 773.772615] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:35 executing program 3: add_key(&(0x7f0000000180)='.ogon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000040000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:35 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000007fffffff00000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1c01]}, 0x10) 2018/06/05 09:48:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000340000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:35 executing program 3: add_key(&(0x7f0000000180)="6c6f676f6efe", &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:35 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000040030000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 774.083612] BTRFS error (device loop1): superblock checksum mismatch [ 774.111304] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='//file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5e00]}, 0x10) 2018/06/05 09:48:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000fffffffb0000"], 0x60}, 0x1}, 0x0) [ 774.336566] BTRFS error (device loop1): superblock checksum mismatch [ 774.373566] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:36 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:36 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000002030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='.//ile1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf303000000000000]}, 0x10) 2018/06/05 09:48:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000004003000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./.ile1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:36 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff0200130002000000000000007fffffff030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000020000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x10) 2018/06/05 09:48:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)="627472667304", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./fi.e1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000200000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x10) 2018/06/05 09:48:36 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./fi/e1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000400000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x10) 2018/06/05 09:48:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:36 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) [ 775.308718] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000200000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:36 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000004030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 775.400988] BTRFS error (device loop1): open_ctree failed [ 775.566928] BTRFS error (device loop1): superblock checksum mismatch [ 775.608524] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c65ffff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x10) 2018/06/05 09:48:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 3: add_key(&(0x7f0000000180)="6c6f676f6e7f", &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000002000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 3: add_key(&(0x7f0000000180)="6c6f676f6e02", &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000200000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x10) 2018/06/05 09:48:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 775.878476] BTRFS error (device loop1): superblock checksum mismatch [ 775.964848] BTRFS error (device loop1): open_ctree failed [ 776.049623] BTRFS error (device loop1): superblock checksum mismatch [ 776.099258] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:37 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:37 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000020000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000100"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1fff8]}, 0x10) 2018/06/05 09:48:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000000000007f"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000020030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf403000000000000]}, 0x10) 2018/06/05 09:48:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 776.431132] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:38 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) [ 776.489546] BTRFS error (device loop1): open_ctree failed [ 776.607132] BTRFS error (device loop1): superblock checksum mismatch [ 776.660051] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000ff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:38 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000034000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531f5", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 3: add_key(&(0x7f0000000180)="6c6f676f6eff", &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x10) 2018/06/05 09:48:38 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x2e, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000007fffffff00"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fb", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf2030000]}, 0x10) 2018/06/05 09:48:38 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000100000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 776.960762] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:38 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0xfeffff}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) [ 777.020683] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000002000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:38 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000020006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 777.157311] BTRFS error (device loop1): superblock checksum mismatch [ 777.241581] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1c010000]}, 0x10) 2018/06/05 09:48:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0xfe7f0000}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000040030000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:38 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000400300000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000200000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:38 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0xfe7f}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) [ 777.476375] BTRFS error (device loop1): superblock checksum mismatch [ 777.517547] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:39 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff0200130002000000007fffffff000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x10) 2018/06/05 09:48:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000400000000"], 0x60}, 0x1}, 0x0) [ 777.669151] BTRFS error (device loop1): superblock checksum mismatch [ 777.694597] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:39 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0xfffffe00}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:39 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000004000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000020000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x10) [ 777.927128] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0x100000000000000}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) [ 778.014692] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:39 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000004000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000fbffffff00"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 778.152995] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0x200000000000000}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 778.237557] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x10) 2018/06/05 09:48:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673e4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000020000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:39 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0x1000000}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:40 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000034000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000003400000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c65318c", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0x2000000}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x10) 2018/06/05 09:48:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000002000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000200"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:40 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000000010006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0x7ffe}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) [ 778.980791] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}, 0x10) 2018/06/05 09:48:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000400"], 0x60}, 0x1}, 0x0) [ 779.052304] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:40 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000ffffffff0006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:40 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0xfeffff00000000}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 779.236138] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0x10) [ 779.283560] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000fffffffb00"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2, 0xfe7f000000000000}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000002000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf803]}, 0x10) 2018/06/05 09:48:41 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="10", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673c0", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000001000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 779.709197] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x10) [ 779.775960] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="14", 0x1, 0xfffffffffffffffe) [ 779.934758] BTRFS error (device loop1): superblock checksum mismatch [ 780.009184] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:41 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000200000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x2, 0xfffffffffffffffe) 2018/06/05 09:48:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x10) 2018/06/05 09:48:41 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x3, 0xfffffffffffffffe) 2018/06/05 09:48:41 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff020013000200000000007fffffff0000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x10) 2018/06/05 09:48:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 780.268622] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:41 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x8, 0xfffffffffffffffe) [ 780.383264] BTRFS error (device loop1): open_ctree failed [ 780.498439] BTRFS error (device loop1): superblock checksum mismatch [ 780.542273] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:42 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000040000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000004000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="627472667304", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x10, 0xfffffffffffffffe) 2018/06/05 09:48:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f0100]}, 0x10) 2018/06/05 09:48:42 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x20000281, 0xfffffffffffffffe) 2018/06/05 09:48:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:42 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000020000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf8ff0100]}, 0x10) 2018/06/05 09:48:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000001"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0xfffff, 0xfffffffffffffffe) [ 781.137119] BTRFS error (device loop1): superblock checksum mismatch [ 781.205735] BTRFS error (device loop1): open_ctree failed [ 781.304486] BTRFS error (device loop1): superblock checksum mismatch [ 781.333789] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x3, 0x100000001, 0x1, {}, 0x4}) add_key(&(0x7f0000000200)="6c6f676f6e00d0edcdd7151ecc4c5fda9b7b0cba6d4119adce2d3e469d3fa22d39bcf4377ec032fa8478d77dc6fac7d42719c433877856bc033e639a1b4c6f0555c7702852d5de40976ab1fc277d6cadf5fe9562d2d2567235cbf4c68c6f74e2799e808836a0702ca1573ca69d7bbb31810a2c55323ee5329bdd200daa9ab35103940c1369ad725d958671c87150bfe4186edc9455fdb8b0726dfaee737df16fe646563148f99d824b21801cd745975f1b95f2b51d3722f5d52b197baea27775b572e4f98884db595c6801247cdb76e8f79df6076bdbf37aec667312c3e8e6a68991856facdfa8f526d7574f94379920d5c3dd7869f7907a47e164f9f5dee8", &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)="0e", 0x1, 0xfffffffffffffffe) 2018/06/05 09:48:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x10) 2018/06/05 09:48:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000fbffffff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:42 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000010000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, r0) socketpair(0x3, 0x803, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000003c0)={@in={0x2, 0x4e22, @multicast1=0xe0000001}, {&(0x7f00000002c0)=""/194, 0xc2}, &(0x7f00000001c0), 0x20}, 0xa0) 2018/06/05 09:48:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000040000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 781.581102] BTRFS error (device loop1): superblock checksum mismatch [ 781.620346] BTRFS error (device loop1): open_ctree failed [ 781.698078] BTRFS error (device loop1): superblock checksum mismatch [ 781.734951] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f8]}, 0x10) 2018/06/05 09:48:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000200000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 3: add_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="01", 0xffffffffffffff51, 0xfffffffffffffffe) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r0, &(0x7f0000000280)="f06117f2b7c6d0a71808803dec8b1760215d86760e7dd262c7890f6bff9d65f3914a026954031a26c6405943eefe9a5de8df", 0x15f, 0x4880, &(0x7f00000002c0)={0xa, 0x4e24, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0xd95f}, 0x1c) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c, 0x3, 0x1, 0x4, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) timerfd_gettime(r1, &(0x7f0000000080)) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 2018/06/05 09:48:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000340000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) 2018/06/05 09:48:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x10) 2018/06/05 09:48:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 782.022270] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000007fffffff"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c653104", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 782.120071] BTRFS error (device loop1): open_ctree failed [ 782.283949] BTRFS error (device loop1): superblock checksum mismatch [ 782.311805] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:43 executing program 3: request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000100)='keyring\x00', 0xfffffffffffffffa) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x2, 0x480) socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0xe, 0x80000) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000300)={r1, r2, 0x100000000, 0x1f4e, &(0x7f00000002c0)="89bb9b0bf0a201f469d650923742d9a9651e8cd0471e2fed2f8494e4e353784c661a90204e", 0x2, 0xcb, 0xffffffff, 0x200, 0x3, 0x9, 0x1000, "ec136242e0d3e3a5f5c382865e9165e3d3c576648e2b4975cc9cbbc9a44f9fcdeeabadfe4acaedd6ae14ecdc4c71aacd94d8b683846c71bc06ccb0780289fdba64f424a250232e9ca62eaa1ed8d87fb5770fc040bdabb9e0cfd7e856910235a18c00d25a47a324ef4a48ff2bd2ea71d8a8eb208ae6d5e1c79e0acc904b2aa02813"}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) 2018/06/05 09:48:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000002000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2400]}, 0x10) 2018/06/05 09:48:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000200000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531fb", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000002000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:44 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, r0) r1 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, &(0x7f0000000200)=0x80) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e22, 0x200, @local={0xfe, 0x80, [], 0xaa}, 0x8}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)={r2, 0x16, "65c645151d37f0ba4284cb7ea62370c3abcbe911b05c"}, &(0x7f00000003c0)=0x1e) 2018/06/05 09:48:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000004003000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 782.590725] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f2]}, 0x10) 2018/06/05 09:48:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 782.685439] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 782.816869] BTRFS error (device loop1): superblock checksum mismatch [ 782.886425] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000020000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:44 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x102, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x101, 0x0, 0x6, 0x2, 0x6, 0xfffffffffffffffd, 0xffff, {0x0, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x3ff, 0x10000, 0x100000001, 0x101, 0xfffffffffffffff9}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x76, "e41069bdf56571fad89829a5a3f51935c1f4eefc79898080fc3752a9f870ef5528b89175e77a2b326e12a2cacb0306fcbbb9a9b30438b007fe7f0289858840155d9f0f4b59bb4eeca47cd570434cc0b3cf000ed963c1e2dca6afd45c7c1ba7d68f77564b9106b072f009dbedc1d3284ca29d93214678"}, &(0x7f0000000240)=0x7e) 2018/06/05 09:48:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x10) 2018/06/05 09:48:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000100030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:44 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)="0e", 0x0, 0xfffffffffffffffe) r0 = semget$private(0x0, 0x3, 0x8) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10002, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000100)=0x80000001) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x5, 0x7, 0x1a6, 0x32b154c7}, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x3ff, 0x6ac, 0x481, 0x42f0, 0x1]) semctl$IPC_RMID(r0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$KDSETMODE(r1, 0x4b3a, 0x7fffffff) semop(r0, &(0x7f00000000c0)=[{0x7, 0x2, 0x800}, {0x2, 0xc000000000, 0x1000}, {0x1, 0x6, 0x800}, {0x3, 0x5, 0x800}], 0x4) epoll_create(0xacf) 2018/06/05 09:48:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 783.129198] BTRFS error (device loop1): superblock checksum mismatch [ 783.160649] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x10) 2018/06/05 09:48:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 783.344741] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:44 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000020000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 783.392177] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:45 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x9) connect$pptp(r0, &(0x7f0000000200)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x1e) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000000)="0e6965171773923f96eeec16a1db85f88537a9c5aafffd46e50511224b47b01a48a3bcea66900de9f8da2b6816b7dc32779c7b1004d00bae25933b094be18efa09581b30cacb5d000000000000000000000000000000", 0x56, 0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x2, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 2018/06/05 09:48:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000004"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x10) 2018/06/05 09:48:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000400000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000040030000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000020"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) r0 = dup(0xffffffffffffff9c) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) socket$nl_crypto(0x10, 0x3, 0x15) 2018/06/05 09:48:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000]}, 0x10) 2018/06/05 09:48:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='//file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731d", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000400030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000fffffffb"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x41) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0x96, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000080)=""/150}, &(0x7f00000001c0)=0x78) 2018/06/05 09:48:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./.ile1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x10) 2018/06/05 09:48:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000034000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000003400000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='.//ile1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:45 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x1000) 2018/06/05 09:48:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000002"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 784.391584] BTRFS error (device loop1): superblock checksum mismatch [ 784.461018] BTRFS error (device loop1): open_ctree failed [ 784.553169] BTRFS error (device loop1): superblock checksum mismatch [ 784.605388] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:46 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000007fffffff00030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 3: r0 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)="0e", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)='logon\x00', r0) 2018/06/05 09:48:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\b', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000000000000]}, 0x10) 2018/06/05 09:48:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./fi.e1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000400300"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:46 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c, 0x3, 0x1, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000200)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff]}, 0x4e24, 0x2, 0x4e22, 0x9, 0x2, 0x80, 0xa0, 0x0, r1, r2}, {0x6, 0x3, 0x7d96, 0x2, 0x401, 0x40, 0x0, 0x6}, {0x7, 0x6f8, 0x5, 0x9}, 0x4, 0x6e6bb3, 0x3, 0x0, 0x2, 0x1}, {{@in=@broadcast=0xffffffff, 0x4d3, 0x6c}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1a}, 0x3505, 0x4, 0x3, 0x11e7dfe2, 0x1000, 0xff, 0x2}}, 0xe8) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) sendmsg$nl_crypto(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f0000000100)={&(0x7f0000000680)=@get={0x118, 0x13, 0x300, 0x70bd2a, 0x25dfdbfe, {{'lrw(camellia)\x00'}, [], [], 0x2000, 0x400}, [{0x8, 0x1}, {0x8, 0x1, 0xb1c}, {0x8, 0x1, 0x9fe6}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0xa5a}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x1ff}]}, 0x118}, 0x1}, 0x24000090) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) 2018/06/05 09:48:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x10) 2018/06/05 09:48:46 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000200000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 784.873193] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./fi/e1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 784.993805] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:46 executing program 3: r0 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/254, 0xfe}, {&(0x7f0000000680)=""/73, 0x49}, {&(0x7f00000003c0)=""/223, 0xdf}, {&(0x7f00000004c0)=""/143, 0x8f}], 0x4, &(0x7f00000005c0)=""/128, 0x80, 0x8}, 0x5) add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080), 0x0, r0) 2018/06/05 09:48:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000020000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 785.174459] BTRFS error (device loop1): superblock checksum mismatch [ 785.228212] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000002000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c65ffff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x10) 2018/06/05 09:48:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:46 executing program 3: add_key(&(0x7f0000000180)="ff1b676f6e00", &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0xffffffffffffffa9, 0xfffffffffffffffe) 2018/06/05 09:48:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:47 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setregs(0xf, r0, 0x3, &(0x7f0000000080)="d5be0a6b5108ead92363e9") add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt(r1, 0x6, 0x6, &(0x7f00000002c0)=""/152, &(0x7f0000000100)=0x98) 2018/06/05 09:48:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 785.510843] BTRFS error (device loop1): superblock checksum mismatch 2018/06/05 09:48:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c653110", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff02001300020000000000000000000200030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) [ 785.567723] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf903000000000000]}, 0x10) 2018/06/05 09:48:47 executing program 3: add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000000)="0e", 0xfffffffffffffedc, 0xfffffffffffffffe) [ 785.820287] BTRFS error (device loop1): superblock checksum mismatch [ 785.877152] BTRFS error (device loop1): open_ctree failed 2018/06/05 09:48:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c653103", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020a00090c000000ffffffffffffffff0200130002000000000000007fffffff030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/06/05 09:48:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1#', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x10) 2018/06/05 09:48:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f00000006c0)=ANY=[]) 2018/06/05 09:48:47 executing program 3: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="0e", 0x1, 0xfffffffffffffffe) r0 = socket$packet(0x11, 0x0, 0x300) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x10002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) [ 786.058799] WARNING: CPU: 0 PID: 25238 at fs/btrfs/volumes.c:1071 close_fs_devices+0xbc7/0xfa0 [ 786.067608] Kernel panic - not syncing: panic_on_warn set ... [ 786.067608] [ 786.074997] CPU: 0 PID: 25238 Comm: syz-executor2 Not tainted 4.17.0+ #84 [ 786.082017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.091523] Call Trace: [ 786.094137] dump_stack+0x1b9/0x294 [ 786.097792] ? dump_stack_print_info.cold.2+0x52/0x52 [ 786.103028] ? close_fs_devices+0xb30/0xfa0 [ 786.107376] panic+0x22f/0x4de [ 786.110598] ? add_taint.cold.5+0x16/0x16 [ 786.114773] ? __warn.cold.8+0x148/0x1b3 [ 786.118873] ? close_fs_devices+0xbc7/0xfa0 [ 786.123226] __warn.cold.8+0x163/0x1b3 [ 786.127134] ? close_fs_devices+0xbc7/0xfa0 [ 786.131501] report_bug+0x252/0x2d0 [ 786.135161] do_error_trap+0x1fc/0x4d0 [ 786.139072] ? trace_hardirqs_on+0xd/0x10 [ 786.143252] ? math_error+0x3f0/0x3f0 [ 786.147080] ? note_gp_changes+0x540/0x540 [ 786.151336] ? __blkdev_put+0x3f1/0x830 [ 786.155342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.160211] do_invalid_op+0x1b/0x20 [ 786.163964] invalid_op+0x14/0x20 [ 786.167439] RIP: 0010:close_fs_devices+0xbc7/0xfa0 [ 786.172369] Code: a0 b4 fe 0f 0b e8 89 a0 b4 fe 0f 0b 48 89 f7 e8 8f 10 f1 fe e9 f6 f5 ff ff e8 75 a0 b4 fe 0f 0b e9 fd fd ff ff e8 69 a0 b4 fe <0f> 0b e9 a8 fd ff ff 48 8b bd 58 fd ff ff e8 26 11 f1 fe e9 35 fd [ 786.191761] RSP: 0018:ffff8801af9e7050 EFLAGS: 00010216 [ 786.197140] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc900052e2000 [ 786.204423] RDX: 0000000000004301 RSI: ffffffff82c4b097 RDI: 0000000000000007 [ 786.211711] RBP: ffff8801af9e7350 R08: ffff8801a920c380 R09: 0000000000000006 [ 786.219085] R10: ffff8801a920c380 R11: 0000000000000000 R12: ffffed0035f3ce25 [ 786.226366] R13: 1ffff10035f3ce5d R14: ffff8801af9e72e8 R15: ffff8801c7f74948 [ 786.233669] ? close_fs_devices+0xbc7/0xfa0 [ 786.238017] ? btrfs_alloc_device+0x8b0/0x8b0 [ 786.242531] ? kasan_check_read+0x11/0x20 [ 786.246695] ? do_raw_spin_unlock+0x9e/0x2e0 [ 786.251129] ? kasan_check_write+0x14/0x20 [ 786.255376] ? wake_up_q+0xb3/0x100 [ 786.259023] ? __mutex_unlock_slowpath+0x422/0x8a0 [ 786.263967] ? wait_for_completion+0x870/0x870 [ 786.268563] btrfs_close_devices+0x29/0x150 [ 786.272878] btrfs_mount_root+0x1419/0x1e70 [ 786.277191] ? btrfs_decode_error+0x70/0x70 [ 786.281504] ? save_stack+0x43/0xd0 [ 786.285129] ? __kasan_slab_free+0x11a/0x170 [ 786.289525] ? kasan_slab_free+0xe/0x10 [ 786.293506] ? kfree+0xd9/0x260 [ 786.296860] ? mount_fs+0xae/0x328 [ 786.300383] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 786.305137] ? do_mount+0x564/0x30b0 [ 786.308849] ? ksys_mount+0x12d/0x140 [ 786.312639] ? __x64_sys_mount+0xbe/0x150 [ 786.316787] ? do_syscall_64+0x1b1/0x800 [ 786.320832] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.326186] ? kasan_check_read+0x11/0x20 [ 786.330319] ? do_raw_spin_unlock+0x9e/0x2e0 [ 786.334722] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 786.339314] ? kasan_check_write+0x14/0x20 [ 786.343535] ? do_raw_spin_lock+0xc1/0x200 [ 786.347768] mount_fs+0xae/0x328 [ 786.351148] ? debug_check_no_obj_freed+0x2ff/0x584 [ 786.356162] vfs_kern_mount.part.34+0xd4/0x4d0 [ 786.360734] ? may_umount+0xb0/0xb0 [ 786.364359] ? quarantine_put+0xeb/0x190 [ 786.368420] ? kfree+0x111/0x260 [ 786.371786] ? btrfs_mount+0x831/0x213e [ 786.375744] vfs_kern_mount+0x40/0x60 [ 786.379536] btrfs_mount+0x4a1/0x213e [ 786.383334] ? kasan_check_read+0x11/0x20 [ 786.387467] ? rcu_is_watching+0x85/0x140 [ 786.391603] ? btrfs_remount+0x16f0/0x16f0 [ 786.395824] ? __lockdep_init_map+0x105/0x590 [ 786.400315] ? __lockdep_init_map+0x105/0x590 [ 786.404796] ? lockdep_init_map+0x9/0x10 [ 786.408854] ? __init_waitqueue_head+0x96/0x140 [ 786.413600] ? init_wait_entry+0x1b0/0x1b0 [ 786.417823] ? memcpy+0x45/0x50 [ 786.421092] ? alloc_vfsmnt+0x771/0x9d0 [ 786.425063] ? mnt_free_id.isra.27+0x60/0x60 [ 786.429466] ? kasan_check_read+0x11/0x20 [ 786.433611] ? graph_lock+0x170/0x170 [ 786.437399] ? rcu_pm_notify+0xc0/0xc0 [ 786.441286] ? trace_hardirqs_off+0xd/0x10 [ 786.445598] ? putname+0xf2/0x130 [ 786.449045] ? find_held_lock+0x36/0x1c0 [ 786.453112] ? lock_downgrade+0x8e0/0x8e0 [ 786.457246] ? module_unload_free+0x5b0/0x5b0 [ 786.461732] mount_fs+0xae/0x328 [ 786.465081] ? btrfs_remount+0x16f0/0x16f0 [ 786.469299] ? mount_fs+0xae/0x328 [ 786.472833] ? mpi_free.cold.1+0x19/0x19 [ 786.476890] vfs_kern_mount.part.34+0xd4/0x4d0 [ 786.481461] ? may_umount+0xb0/0xb0 [ 786.485075] ? _raw_read_unlock+0x22/0x30 [ 786.489208] ? __get_fs_type+0x97/0xc0 [ 786.493091] do_mount+0x564/0x30b0 [ 786.496616] ? copy_mount_string+0x40/0x40 [ 786.500835] ? rcu_pm_notify+0xc0/0xc0 [ 786.504713] ? copy_mount_options+0x5f/0x380 [ 786.509108] ? rcu_read_lock_sched_held+0x108/0x120 [ 786.514128] ? kmem_cache_alloc_trace+0x616/0x780 [ 786.518982] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.524524] ? _copy_from_user+0xdf/0x150 [ 786.528675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.534202] ? copy_mount_options+0x285/0x380 [ 786.538691] ksys_mount+0x12d/0x140 [ 786.542305] __x64_sys_mount+0xbe/0x150 [ 786.546282] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 786.551298] do_syscall_64+0x1b1/0x800 [ 786.555191] ? finish_task_switch+0x1ca/0x840 [ 786.559674] ? syscall_return_slowpath+0x5c0/0x5c0 [ 786.564590] ? syscall_return_slowpath+0x30f/0x5c0 [ 786.569509] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 786.574864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.579694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.584874] RIP: 0033:0x45843a [ 786.588041] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 786.607237] RSP: 002b:00007efe324f9ba8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 786.614940] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 000000000045843a [ 786.622196] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efe324f9bf0 [ 786.629455] RBP: 0000000000000001 R08: 00000000200006c0 R09: 0000000020000000 [ 786.636711] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000013 [ 786.644643] R13: 0000000000000001 R14: 0000000000700008 R15: 0000000000000000 [ 786.652616] Dumping ftrace buffer: [ 786.656617] (ftrace buffer empty) [ 786.660313] Kernel Offset: disabled [ 786.663927] Rebooting in 86400 seconds..