31.152395] getname_flags+0xc8/0x550 [ 431.156204] do_sys_open+0x202/0x3e0 [ 431.159914] ? filp_open+0x60/0x60 [ 431.163530] ? SyS_pwrite64+0xca/0x140 [ 431.167413] ? fput+0xb/0x140 [ 431.170518] ? do_syscall_64+0x4c/0x640 [ 431.174485] ? do_sys_open+0x3e0/0x3e0 [ 431.178366] do_syscall_64+0x1d5/0x640 [ 431.182253] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 431.187431] RIP: 0033:0x416921 06:02:27 executing program 3: r0 = socket(0x28, 0x800000003, 0x8) dup(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000380)={@any, 0x2}) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r3, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010102}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:dmidecode_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x9c, r3, 0x8, 0x70bd26, 0x25dfdbfc}, 0x9c}, 0x1, 0x0, 0x0, 0x40810}, 0x4000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) getsockname(r4, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000100)=0x80) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x4, 0x1, 0xff, 0xf, 0xf53, 0xf442}, &(0x7f0000000040)=0x20) socket$caif_stream(0x25, 0x1, 0x2) [ 431.190614] RSP: 002b:00007f77bb349a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 431.198310] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 0000000000416921 [ 431.205567] RDX: 00007f77bb349b0a RSI: 0000000000000002 RDI: 00007f77bb349b00 [ 431.212823] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 431.220083] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 431.227345] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:27 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x1004001, 0x0) r0 = socket(0x18, 0x2, 0x7ff) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000100)=@nfc={0x27, 0x1, 0x2, 0x4}, 0x80) getsockopt$rose(r0, 0x104, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 06:02:27 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 431.253006] print_req_error: I/O error, dev loop4, sector 0 [ 431.333872] FAULT_INJECTION: forcing a failure. [ 431.333872] name failslab, interval 1, probability 0, space 0, times 0 [ 431.334974] FAULT_INJECTION: forcing a failure. [ 431.334974] name failslab, interval 1, probability 0, space 0, times 0 [ 431.361178] CPU: 0 PID: 7671 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 431.368976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.378322] Call Trace: [ 431.380904] dump_stack+0x1b2/0x283 [ 431.384530] should_fail.cold+0x10a/0x154 [ 431.388683] should_failslab+0xd6/0x130 [ 431.392646] kmem_cache_alloc+0x28e/0x3c0 [ 431.396785] get_empty_filp+0x86/0x3e0 [ 431.400671] path_openat+0x87/0x2aa0 [ 431.404375] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 431.408859] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 431.413340] ? kmem_cache_alloc+0x124/0x3c0 [ 431.417649] ? getname_flags+0xc8/0x550 [ 431.421608] ? do_sys_open+0x202/0x3e0 [ 431.425485] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 431.430838] ? path_mountpoint+0x960/0x960 [ 431.435062] ? trace_hardirqs_on+0x10/0x10 [ 431.439289] ? __generic_file_write_iter+0x194/0x590 [ 431.444390] do_filp_open+0x18e/0x250 [ 431.448187] ? may_open_dev+0xe0/0xe0 [ 431.452069] ? __alloc_fd+0x1bf/0x490 [ 431.455869] ? lock_acquire+0x170/0x3f0 [ 431.459832] ? lock_downgrade+0x6e0/0x6e0 [ 431.463966] ? do_raw_spin_unlock+0x164/0x250 [ 431.468448] ? __alloc_fd+0x1bf/0x490 [ 431.472249] do_sys_open+0x292/0x3e0 [ 431.475959] ? filp_open+0x60/0x60 [ 431.479488] ? SyS_pwrite64+0xca/0x140 [ 431.483359] ? fput+0xb/0x140 [ 431.486465] ? do_syscall_64+0x4c/0x640 [ 431.490418] ? do_sys_open+0x3e0/0x3e0 [ 431.494291] do_syscall_64+0x1d5/0x640 [ 431.498178] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 431.503374] RIP: 0033:0x416921 [ 431.506553] RSP: 002b:00007f77bb349a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 431.514250] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 0000000000416921 [ 431.521507] RDX: 00007f77bb349b0a RSI: 0000000000000002 RDI: 00007f77bb349b00 [ 431.528764] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 431.536019] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 431.543274] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 431.550535] CPU: 1 PID: 7668 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 431.558320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.567660] Call Trace: [ 431.570235] dump_stack+0x1b2/0x283 [ 431.573855] should_fail.cold+0x10a/0x154 [ 431.577996] should_failslab+0xd6/0x130 [ 431.581959] kmem_cache_alloc+0x28e/0x3c0 [ 431.586098] ? shmem_destroy_callback+0xa0/0xa0 [ 431.590759] shmem_alloc_inode+0x18/0x40 [ 431.594809] ? shmem_destroy_callback+0xa0/0xa0 [ 431.599461] alloc_inode+0x5d/0x170 [ 431.603064] new_inode_pseudo+0x14/0xe0 [ 431.607012] new_inode+0x1b/0x40 [ 431.610357] shmem_get_inode+0x74/0x780 [ 431.614320] __shmem_file_setup.part.0+0x104/0x3c0 [ 431.619223] ? shmem_rename2+0x6e0/0x6e0 [ 431.623259] ? __alloc_fd+0x1bf/0x490 [ 431.627042] SyS_memfd_create+0x1f6/0x3a0 [ 431.631171] ? shmem_fcntl+0x120/0x120 [ 431.635034] ? SyS_clock_settime+0x1a0/0x1a0 [ 431.639419] ? do_syscall_64+0x4c/0x640 [ 431.643368] ? shmem_fcntl+0x120/0x120 [ 431.647227] do_syscall_64+0x1d5/0x640 [ 431.651090] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 431.656262] RIP: 0033:0x45cb29 [ 431.659423] RSP: 002b:00007f37a4244a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 431.667104] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045cb29 [ 431.674348] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1c91 06:02:28 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 431.681591] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 431.688834] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000005 [ 431.696091] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f37a42456d4 [ 431.761347] FAULT_INJECTION: forcing a failure. [ 431.761347] name failslab, interval 1, probability 0, space 0, times 0 [ 431.791710] CPU: 0 PID: 7683 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 431.799530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.809392] Call Trace: [ 431.811974] dump_stack+0x1b2/0x283 [ 431.815596] should_fail.cold+0x10a/0x154 [ 431.819743] should_failslab+0xd6/0x130 [ 431.823716] kmem_cache_alloc+0x28e/0x3c0 [ 431.827863] get_empty_filp+0x86/0x3e0 [ 431.831755] path_openat+0x87/0x2aa0 [ 431.835458] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 431.839942] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 431.844423] ? kmem_cache_alloc+0x124/0x3c0 [ 431.848730] ? getname_flags+0xc8/0x550 [ 431.852690] ? do_sys_open+0x202/0x3e0 [ 431.856572] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 431.861931] ? path_mountpoint+0x960/0x960 [ 431.866164] ? trace_hardirqs_on+0x10/0x10 [ 431.870409] do_filp_open+0x18e/0x250 [ 431.874199] ? may_open_dev+0xe0/0xe0 [ 431.877985] ? __alloc_fd+0x1bf/0x490 [ 431.881780] ? lock_acquire+0x170/0x3f0 [ 431.885745] ? lock_downgrade+0x6e0/0x6e0 [ 431.889900] ? do_raw_spin_unlock+0x164/0x250 [ 431.894382] ? __alloc_fd+0x1bf/0x490 [ 431.898176] do_sys_open+0x292/0x3e0 [ 431.901881] ? filp_open+0x60/0x60 [ 431.905418] ? SyS_pwrite64+0xca/0x140 [ 431.909305] ? fput+0xb/0x140 [ 431.912397] ? do_syscall_64+0x4c/0x640 [ 431.916360] ? do_sys_open+0x3e0/0x3e0 [ 431.920241] do_syscall_64+0x1d5/0x640 [ 431.924125] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 431.929300] RIP: 0033:0x416921 [ 431.932481] RSP: 002b:00007f77bb349a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 431.940178] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 0000000000416921 [ 431.947437] RDX: 00007f77bb349b0a RSI: 0000000000000002 RDI: 00007f77bb349b00 [ 431.954697] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 431.961951] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 431.969211] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 432.022625] BTRFS error (device loop4): superblock checksum mismatch 06:02:28 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:28 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 432.062935] BTRFS error (device loop4): open_ctree failed [ 432.126311] FAULT_INJECTION: forcing a failure. [ 432.126311] name failslab, interval 1, probability 0, space 0, times 0 [ 432.154192] FAULT_INJECTION: forcing a failure. [ 432.154192] name failslab, interval 1, probability 0, space 0, times 0 [ 432.175684] CPU: 0 PID: 7693 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 432.183474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.192811] Call Trace: [ 432.195390] dump_stack+0x1b2/0x283 [ 432.199017] should_fail.cold+0x10a/0x154 [ 432.203162] should_failslab+0xd6/0x130 [ 432.207129] kmem_cache_alloc+0x28e/0x3c0 [ 432.211275] selinux_file_alloc_security+0xaf/0x190 [ 432.216286] security_file_alloc+0x66/0xa0 [ 432.220511] ? selinux_is_enabled+0x5/0x50 [ 432.224734] get_empty_filp+0x15c/0x3e0 [ 432.228713] path_openat+0x87/0x2aa0 [ 432.232417] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 432.236901] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 432.241387] ? kmem_cache_alloc+0x124/0x3c0 [ 432.245693] ? getname_flags+0xc8/0x550 [ 432.249652] ? do_sys_open+0x202/0x3e0 [ 432.253528] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 432.258882] ? path_mountpoint+0x960/0x960 [ 432.263106] ? trace_hardirqs_on+0x10/0x10 [ 432.267333] do_filp_open+0x18e/0x250 [ 432.271119] ? may_open_dev+0xe0/0xe0 [ 432.274905] ? __alloc_fd+0x1bf/0x490 [ 432.278689] ? lock_acquire+0x170/0x3f0 [ 432.282644] ? lock_downgrade+0x6e0/0x6e0 [ 432.286776] ? do_raw_spin_unlock+0x164/0x250 [ 432.291256] ? __alloc_fd+0x1bf/0x490 [ 432.295060] do_sys_open+0x292/0x3e0 [ 432.298777] ? filp_open+0x60/0x60 [ 432.302297] ? SyS_pwrite64+0xca/0x140 [ 432.306178] ? fput+0xb/0x140 [ 432.309271] ? do_syscall_64+0x4c/0x640 [ 432.313231] ? do_sys_open+0x3e0/0x3e0 [ 432.317110] do_syscall_64+0x1d5/0x640 [ 432.320986] entry_SYSCALL_64_after_hwframe+0x46/0xbb 06:02:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) acct(&(0x7f0000000080)='./file0\x00') r0 = socket(0x2, 0x800000003, 0xffffff7f) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x14, r2, 0x536ae464467e3e0b, 0x0, 0x0, {0x21}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="01", @ANYRES16=r2, @ANYBLOB="00082cbd7000ffdbdf250f000000"], 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x2) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x280102, 0x0) [ 432.326156] RIP: 0033:0x416921 [ 432.329331] RSP: 002b:00007f77bb349a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 432.337024] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 0000000000416921 [ 432.344275] RDX: 00007f77bb349b0a RSI: 0000000000000002 RDI: 00007f77bb349b00 [ 432.351541] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 432.358798] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 432.366054] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000000c0)=0x3c) [ 432.375401] CPU: 1 PID: 7697 Comm: syz-executor.2 Not tainted 4.14.184-syzkaller #0 [ 432.383194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.392531] Call Trace: [ 432.395111] dump_stack+0x1b2/0x283 [ 432.398733] should_fail.cold+0x10a/0x154 [ 432.402878] should_failslab+0xd6/0x130 [ 432.406847] kmem_cache_alloc+0x28e/0x3c0 [ 432.410991] selinux_inode_alloc_security+0xb1/0x2a0 [ 432.416084] security_inode_alloc+0x8f/0xd0 [ 432.420400] inode_init_always+0x576/0xb10 [ 432.424625] alloc_inode+0x7a/0x170 [ 432.428245] new_inode_pseudo+0x14/0xe0 [ 432.432215] new_inode+0x1b/0x40 [ 432.435576] shmem_get_inode+0x74/0x780 [ 432.439553] __shmem_file_setup.part.0+0x104/0x3c0 [ 432.444471] ? shmem_rename2+0x6e0/0x6e0 [ 432.448521] ? __alloc_fd+0x1bf/0x490 [ 432.452332] SyS_memfd_create+0x1f6/0x3a0 [ 432.456571] ? shmem_fcntl+0x120/0x120 [ 432.460450] ? SyS_clock_settime+0x1a0/0x1a0 [ 432.464849] ? do_syscall_64+0x4c/0x640 [ 432.468812] ? shmem_fcntl+0x120/0x120 [ 432.472692] do_syscall_64+0x1d5/0x640 [ 432.476573] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 432.481747] RIP: 0033:0x45cb29 [ 432.484918] RSP: 002b:00007f37a4244a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 432.492605] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045cb29 [ 432.499960] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1c91 [ 432.507301] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 432.514555] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000005 [ 432.521809] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f37a42456d4 06:02:29 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x2) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r2, r3, 0x0, 0xff7ffffe) renameat2(r1, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./bus\x00', 0x5) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e1e}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r4) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f00000000c0)=0x10001, 0x4) recvfrom(r0, &(0x7f0000000480)=""/108, 0x6c, 0x1, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x101000, 0x0) getsockopt$X25_QBITINCL(r5, 0x106, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 432.609307] FAULT_INJECTION: forcing a failure. [ 432.609307] name failslab, interval 1, probability 0, space 0, times 0 [ 432.629064] CPU: 1 PID: 7708 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 432.637151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.646486] Call Trace: [ 432.649051] dump_stack+0x1b2/0x283 [ 432.652652] should_fail.cold+0x10a/0x154 [ 432.656775] should_failslab+0xd6/0x130 [ 432.660724] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 432.665366] ? loop_get_status64+0x100/0x100 [ 432.669745] __kthread_create_on_node+0xbe/0x3a0 [ 432.674472] ? kthread_park+0x130/0x130 [ 432.678418] ? lo_ioctl+0x87/0x1c00 [ 432.682017] ? __mutex_lock+0x2cb/0x1430 [ 432.686052] ? __fget+0x1ff/0x360 [ 432.689475] ? loop_get_status64+0x100/0x100 [ 432.693852] kthread_create_on_node+0xa8/0xd0 [ 432.698319] ? __kthread_create_on_node+0x3a0/0x3a0 [ 432.703307] ? __lockdep_init_map+0x100/0x560 [ 432.707774] ? __lockdep_init_map+0x100/0x560 [ 432.712260] lo_ioctl+0xca9/0x1c00 [ 432.715773] ? loop_clr_fd+0xac0/0xac0 [ 432.719631] blkdev_ioctl+0x91d/0x17c0 [ 432.723488] ? blkpg_ioctl+0x8d0/0x8d0 [ 432.727357] ? trace_hardirqs_on+0x10/0x10 [ 432.731583] block_ioctl+0xd9/0x120 [ 432.735182] ? blkdev_fallocate+0x3a0/0x3a0 [ 432.739474] do_vfs_ioctl+0x75a/0xfe0 [ 432.743251] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 432.748845] ? ioctl_preallocate+0x1a0/0x1a0 [ 432.753233] ? security_file_ioctl+0x76/0xb0 [ 432.757623] ? security_file_ioctl+0x83/0xb0 [ 432.762022] SyS_ioctl+0x7f/0xb0 [ 432.765359] ? do_vfs_ioctl+0xfe0/0xfe0 [ 432.769312] do_syscall_64+0x1d5/0x640 [ 432.773179] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 432.778341] RIP: 0033:0x45c9f7 [ 432.781503] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 432.789182] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 432.796441] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 432.803682] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 432.810921] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 432.818164] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000080)=0x3, 0x4) 06:02:29 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xac, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x100}, {0x8, 0xb, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x5}, {0x6, 0x16, 0x7357}, {0x5}, {0x6}, {0x8, 0xb, 0xffff}}]}, 0xac}, 0x1, 0x0, 0x0, 0x845}, 0x4000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x8) finit_module(r3, &(0x7f0000000180)='bbr\x00', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000340)=0x8) 06:02:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r0, 0xc0984124, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0xffff}], 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x2, @fixed={[], 0x12}, 0xffff}, 0xe) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)=""/171, 0xab}, {&(0x7f0000000280)=""/31, 0x1f}, {&(0x7f0000000400)=""/5, 0x5}, {&(0x7f0000000440)=""/37, 0x25}, {&(0x7f0000000480)=""/9, 0x9}, {&(0x7f00000004c0)=""/104, 0x68}], 0x6}, 0x100) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000600)=""/91, &(0x7f0000000680)=0x5b) 06:02:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x3}], 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket(0x11, 0x800000003, 0x8) finit_module(r4, &(0x7f0000000180)='bbr\x00', 0x1) bind(r4, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000240)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r5, &(0x7f0000000140)={0x0, 0x5a, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, r1, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000004) [ 433.149107] print_req_error: I/O error, dev loop4, sector 128 [ 433.155117] print_req_error: I/O error, dev loop4, sector 0 06:02:29 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 433.280592] FAULT_INJECTION: forcing a failure. [ 433.280592] name failslab, interval 1, probability 0, space 0, times 0 [ 433.292114] CPU: 0 PID: 7741 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 433.299901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.309237] Call Trace: [ 433.311807] dump_stack+0x1b2/0x283 [ 433.315414] should_fail.cold+0x10a/0x154 [ 433.319549] should_failslab+0xd6/0x130 [ 433.323499] kmem_cache_alloc+0x28e/0x3c0 [ 433.327622] __kernfs_new_node+0x6f/0x470 [ 433.331745] kernfs_new_node+0x7b/0xe0 [ 433.335607] kernfs_create_dir_ns+0x3c/0x130 [ 433.339994] internal_create_group+0xea/0x7e0 [ 433.344470] lo_ioctl+0x1108/0x1c00 [ 433.348073] ? loop_clr_fd+0xac0/0xac0 [ 433.351934] blkdev_ioctl+0x91d/0x17c0 [ 433.355790] ? blkpg_ioctl+0x8d0/0x8d0 [ 433.359654] ? trace_hardirqs_on+0x10/0x10 [ 433.363868] block_ioctl+0xd9/0x120 [ 433.367468] ? blkdev_fallocate+0x3a0/0x3a0 [ 433.371762] do_vfs_ioctl+0x75a/0xfe0 [ 433.375538] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 433.381132] ? ioctl_preallocate+0x1a0/0x1a0 [ 433.385539] ? security_file_ioctl+0x76/0xb0 [ 433.389922] ? security_file_ioctl+0x83/0xb0 [ 433.394315] SyS_ioctl+0x7f/0xb0 [ 433.397660] ? do_vfs_ioctl+0xfe0/0xfe0 [ 433.401612] do_syscall_64+0x1d5/0x640 [ 433.405480] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 433.410641] RIP: 0033:0x45c9f7 [ 433.413801] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 433.421487] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 433.428731] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 433.435976] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 433.443313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 433.450573] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b08b10e95ea618204fd9a000001000000000001fffffff60000005f42485266535f4d5a2302b66d6cf6c9335e70376b0e7342fd2f6e0be94ae0f237af1d24100e3de400a37daa11779bdca788e988d232080746887ae3e821d74411cbc2b0d3", 0x8a, 0x10000}], 0x200000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140), 0x8) 06:02:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000080)=""/117, 0x75) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, r2, 0x0, 0xff7ffffe) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000100)={0x9}) [ 433.509251] BTRFS error (device loop5): superblock checksum mismatch 06:02:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040)="4a690f28c1f5434c3d5329a2a429b183dbfe64ea8b2a1f1016961ce4b5e10a8e8343efdb3164f9b5afe116648c9a7b7b62b8053cae11b58ce8a462efb36555e0", 0x40, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r4 = socket(0x11, 0x800000003, 0x8) finit_module(r4, &(0x7f0000000180)='bbr\x00', 0x1) bind(r4, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000), 0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="820000003990e314ebc7d64543777b72c8494e0a17f5034088b52f245d060bd2c49fefb10efb862cd6e53f07f4d32ae73f2912bdce882e2c6f6d625c8faffc284ac8629ba0b1026a112183b7b40e32df9ac382a39e2ff60d25b38845b14303e9ca8ca3f417febb76d1232a18c3100000000000000001"], &(0x7f0000000300)=0x8a) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xffff, @default, @netrom={'nr', 0x0}, 0x7, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f00000000c0)={0x2, 'veth0_to_batadv\x00', {0x7}, 0x8}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) 06:02:30 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000000c0)) [ 433.618568] BTRFS error (device loop5): open_ctree failed [ 433.726304] FAULT_INJECTION: forcing a failure. [ 433.726304] name failslab, interval 1, probability 0, space 0, times 0 [ 433.755104] CPU: 1 PID: 7778 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 433.762913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.772256] Call Trace: [ 433.774839] dump_stack+0x1b2/0x283 [ 433.778462] should_fail.cold+0x10a/0x154 [ 433.782608] should_failslab+0xd6/0x130 [ 433.784838] print_req_error: I/O error, dev loop5, sector 0 [ 433.786577] kmem_cache_alloc+0x28e/0x3c0 [ 433.796390] __kernfs_new_node+0x6f/0x470 [ 433.800552] kernfs_new_node+0x7b/0xe0 [ 433.804440] __kernfs_create_file+0x3d/0x320 [ 433.807512] print_req_error: I/O error, dev loop5, sector 0 [ 433.808840] sysfs_add_file_mode_ns+0x1e1/0x450 [ 433.808854] internal_create_group+0x23b/0x7e0 [ 433.808872] lo_ioctl+0x1108/0x1c00 [ 433.808886] ? loop_clr_fd+0xac0/0xac0 [ 433.814594] Buffer I/O error on dev loop5, logical block 0, async page read [ 433.819224] blkdev_ioctl+0x91d/0x17c0 [ 433.819232] ? blkpg_ioctl+0x8d0/0x8d0 [ 433.819242] ? trace_hardirqs_on+0x10/0x10 [ 433.819261] block_ioctl+0xd9/0x120 [ 433.827743] print_req_error: I/O error, dev loop5, sector 0 [ 433.831297] ? blkdev_fallocate+0x3a0/0x3a0 [ 433.831307] do_vfs_ioctl+0x75a/0xfe0 [ 433.831320] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 433.831330] ? ioctl_preallocate+0x1a0/0x1a0 [ 433.831350] ? security_file_ioctl+0x76/0xb0 [ 433.831359] ? security_file_ioctl+0x83/0xb0 [ 433.831368] SyS_ioctl+0x7f/0xb0 [ 433.838477] Buffer I/O error on dev loop5, logical block 0, async page read [ 433.842302] ? do_vfs_ioctl+0xfe0/0xfe0 [ 433.849650] print_req_error: I/O error, dev loop5, sector 0 [ 433.850386] do_syscall_64+0x1d5/0x640 [ 433.854030] Buffer I/O error on dev loop5, logical block 0, async page read [ 433.859694] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 433.859702] RIP: 0033:0x45c9f7 06:02:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) sched_getparam(r1, &(0x7f0000000140)) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c828}, 0x24044081) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 433.859707] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 433.859718] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 433.864826] print_req_error: I/O error, dev loop5, sector 0 [ 433.867872] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 433.867877] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 433.867883] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 433.867889] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 433.976907] Buffer I/O error on dev loop5, logical block 0, async page read [ 433.977447] print_req_error: I/O error, dev loop4, sector 128 [ 433.995758] Buffer I/O error on dev loop5, logical block 0, async page read [ 434.005438] Buffer I/O error on dev loop5, logical block 0, async page read [ 434.013067] Buffer I/O error on dev loop5, logical block 3, async page read [ 434.029360] Buffer I/O error on dev loop5, logical block 0, async page read [ 434.036775] Buffer I/O error on dev loop5, logical block 0, async page read [ 434.047950] Buffer I/O error on dev loop5, logical block 0, async page read 06:02:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) [ 434.088985] BTRFS error (device loop5): superblock checksum mismatch 06:02:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x24200, 0x0) sendmsg$inet6(r2, &(0x7f0000000180)={&(0x7f0000000100)={0xa, 0x8000, 0x7f, @mcast2, 0x10001}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000200)="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", 0x1000}], 0x1, &(0x7f0000001200)=[@rthdrdstopts={{0x28, 0x29, 0x37, {0xcf, 0x1, [], [@enc_lim={0x4, 0x1, 0x3}, @pad1, @ra={0x5, 0x2, 0x1f}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8000}}, @flowinfo={{0x14, 0x29, 0xb, 0x2}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x2c, 0xa, 0x1, 0x1, 0x0, [@loopback, @remote, @mcast2, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}}}, @rthdrdstopts={{0x150, 0x29, 0x37, {0x0, 0x26, [], [@calipso={0x7, 0x18, {0x0, 0x4, 0x9, 0x1, [0x100000000, 0x2]}}, @ra={0x5, 0x2, 0xca}, @pad1, @generic={0x6, 0x4e, "0b2fae6c6a3294ef424553639951540f938e6745304a426a16b342d606637e32f72fa0b4e78c52b8fd067703093bebfe15b24643c50197f2a7d191554b46341e51de3ccc1087f60a09ec9ea393f0"}, @calipso={0x7, 0x10, {0x2, 0x2, 0x1, 0x8001, [0x4]}}, @generic={0x1, 0xb0, "2902143ea4866150ba5452bef87512efd56b39f121bba3bea99a8a7878b0043a49dc3553a5aa945fe2c230e04c4bde0b7c6ef04dc803ce616d48b20537b497b20fe499a31cced145e375fa1999a153717aa5497236c76d2d53ee6fd2cef5c9c781dd3890838df98c73675f2099ab215ebe77bfee4c47b1144d19031158dcee27744c0e84b4bea9f62de7814bc9a508c8f3e3d4fd7150476ea888180c60be0c20f86e37426b25d1681f8be7014c4c2887"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @hopopts={{0x50, 0x29, 0x36, {0x2f, 0x6, [], [@calipso={0x7, 0x30, {0x0, 0xa, 0x9, 0x0, [0xc8, 0x29, 0xbaa1, 0x3, 0x7]}}]}}}], 0x278}, 0x40080) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r3, 0x80006) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000080)={0x9, 0x81, 0xac9}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x4400, 0x0) bind$vsock_stream(r3, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @local}, 0x10) 06:02:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="88000000031400042abd7000ffdbdf250900020073797a31000000000800410073697700140033006261746164765f7300020073797a3100000000080041007278650014003300697036746e6c300000000000000000000900020073797a30000000000800410073697700140033007369743000"/136], 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x814) [ 434.223064] BTRFS error (device loop5): open_ctree failed 06:02:30 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$DRM_IOCTL_MODE_SETPROPERTY(0xffffffffffffffff, 0xc01064ab, &(0x7f0000000240)={0xfffffffffffffffe, 0x3, 0x6}) sendto$inet6(r2, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000140)={0x10004, 0x3, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) sendfile(r2, r3, 0x0, 0xff7ffffe) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f00000000c0)=0xb8e) [ 434.412151] FAULT_INJECTION: forcing a failure. [ 434.412151] name failslab, interval 1, probability 0, space 0, times 0 [ 434.434315] CPU: 1 PID: 7828 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 434.442117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.451481] Call Trace: [ 434.454111] dump_stack+0x1b2/0x283 [ 434.457739] should_fail.cold+0x10a/0x154 [ 434.461890] should_failslab+0xd6/0x130 [ 434.465862] kmem_cache_alloc+0x28e/0x3c0 [ 434.469998] __kernfs_new_node+0x6f/0x470 [ 434.474125] kernfs_new_node+0x7b/0xe0 [ 434.477989] __kernfs_create_file+0x3d/0x320 [ 434.482373] sysfs_add_file_mode_ns+0x1e1/0x450 [ 434.487110] internal_create_group+0x23b/0x7e0 [ 434.491673] lo_ioctl+0x1108/0x1c00 [ 434.495275] ? loop_clr_fd+0xac0/0xac0 [ 434.499138] blkdev_ioctl+0x91d/0x17c0 [ 434.503005] ? blkpg_ioctl+0x8d0/0x8d0 [ 434.506871] ? trace_hardirqs_on+0x10/0x10 [ 434.511091] block_ioctl+0xd9/0x120 [ 434.514688] ? blkdev_fallocate+0x3a0/0x3a0 [ 434.518981] do_vfs_ioctl+0x75a/0xfe0 [ 434.522758] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 434.528356] ? ioctl_preallocate+0x1a0/0x1a0 [ 434.532741] ? security_file_ioctl+0x76/0xb0 [ 434.537125] ? security_file_ioctl+0x83/0xb0 [ 434.541507] SyS_ioctl+0x7f/0xb0 [ 434.544851] ? do_vfs_ioctl+0xfe0/0xfe0 [ 434.548803] do_syscall_64+0x1d5/0x640 [ 434.552676] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 434.557836] RIP: 0033:0x45c9f7 [ 434.560999] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.568695] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 434.575938] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 434.583291] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 434.590548] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 434.597788] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x24}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000004000)={&(0x7f0000003880)={0x760, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xe2932173}}, {0x8}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0xe4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xea}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0xfffb, 0xff, 0xff, 0x400}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x4}}, {{0x8}, {0x170, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x8, 0x1, 0x6, 0x3}, {0x401, 0x1, 0xc, 0xffff5fdf}, {0x8, 0x80, 0x0, 0xc7c}, {0x0, 0x0, 0x4, 0xffffffff}, {0xfd5f, 0x1f, 0x6}, {0xb7, 0x40, 0x7, 0xf7}, {0x4, 0xf5, 0xcb, 0x5}, {0x1, 0x7, 0x1, 0x6}, {0x100, 0x24, 0x4}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x80, 0x3, 0x0, 0x7}, {0xff, 0x3f, 0x3, 0x7}]}}}]}}, {{0x8, 0x1, r6}, {0xc4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}]}, 0x760}, 0x1, 0x0, 0x0, 0x20008040}, 0x48090) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000140)) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) setsockopt(r7, 0x3, 0x5, &(0x7f00000000c0)="1c9e2a86576c9566c87d3e87bf0207b1c46424e8bef07cf9e4cf421b81ea54480f3e46df7b65050b3fc703aa969b3b0bc69d02a7c7ed07fc46e26a2319e65a930db7a8a7c30fce", 0x47) ftruncate(r7, 0x80006) ioctl$DRM_IOCTL_MODE_GETFB(r7, 0xc01c64ad, &(0x7f0000000080)={0x6, 0xd159, 0xf986, 0x9, 0x101, 0x1f, 0x3e}) [ 434.732611] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 434.766275] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4dc337a82ddb61c347cb5c71ca5eb7b9750459d24e18580ba7c05fc98e9aabeba5c445c017931c77f86bce2b0ef5676db854f5f7298e023b10b89e7c2fc0dceca30b63c90b8d503c", 0x8f, 0x10000}, {&(0x7f0000000200)="dce23a03a0f735ac637ff9991f16278bb5d1186f1d54b05b279f374950aeb95ce5bbd862515840759881e2d1b27f1a92d5678d955612a84168a4449334291443ff1f2602dbe6b451b5a4ed1c1e008b881b0eb6c931e20454124dbdb691ce94e0f6d111803cfe1f1efa37ec7503e8d5395710b2316aa2b131fff83de354f99045302da92b48b973599d08e5f6f0a1c81e57b05d94", 0x94, 0x7}], 0x10000, 0x0) 06:02:31 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) accept$netrom(r0, &(0x7f0000000000)={{0x3, @rose}, [@remote, @rose, @rose, @rose, @null, @default, @remote, @default]}, &(0x7f0000000080)=0x48) 06:02:31 executing program 3: bind$phonet(0xffffffffffffffff, &(0x7f0000000100)={0x23, 0x77, 0x3b, 0x7}, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10200}], 0x108400, 0x0) [ 434.886178] BTRFS error (device loop5): superblock checksum mismatch 06:02:31 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000), 0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000280)={0x0, 0x9}, 0x8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r5, r6, 0x0, 0xff7ffffe) ioctl$VIDIOC_SUBDEV_S_FMT(r6, 0xc0585605, &(0x7f0000000340)={0x1, 0x0, {0x2, 0x5c, 0x201a, 0x2, 0x5, 0x1, 0x1, 0x2}}) setuid(r4) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x81, 0x1ff}, {0x2e, 0x5}]}, 0x14, 0x1) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dmidecode_exec_t:s0\x00', 0x26, 0x2) 06:02:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0xe72}], 0x84080, 0x0) [ 434.992492] BTRFS error (device loop5): open_ctree failed 06:02:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x40, 0x0, 0x6}}, 0x14) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x800, 0x0) 06:02:31 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000340)="b703b195bd26e6b25685c9707a8bd4eec544e12decb1d085aee3595fca5885b15e933c10a800be56ca8a18a8d46ffe92d1b9682a94a9fab15b9743c2aca451c8cfc1fdc9f0a843e1cdae90eca54ec228769ac9b4a6337c995a8efba3e90f50a99dece5b9f8f0f248eeb1157cddeb8840bb8eee9301097f42c9a7201491a2d3879289a62e1b2a1bd92ec439e3d889b04134a18cc06ccae008220c65815b6d4eedff508093a5599dae457869aa7bbd4b3da0aabc151eea2441fbce656db0ce39beb9569b89c229e43ac0a0fb8693b321e980ed79002ff6d6265c07d06c8a483b5fe232be053688b9c45f06396a", 0xec, 0x3}, {&(0x7f0000000440)="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", 0x1000, 0x9}, {&(0x7f0000001440)="439dacaaf9445d3f631266b84a8599016bee374c904dfd345a3a6823da4ff212d2e5a6a564864e002abd56f118d6c97f1c0890f3c1fa6dab97bb0ffe267f7bc30f553742d344e52f7b4624edf034784017082f49ff8438228af1d01029519bc5e5ce6d16e8d279e5bb5a293daf15d6ce74dffd1a511db0d99ea730e6bab774670d34b437b617563e13f2fc5cf81230f1e66ae560ec463542e96af5e42df6e456f177fc87c90c27b38291a32051af226695761e402932dbccf169885cbe356a7832b88a1c9616a027a62382e9d826b241d2bc252160fa3ee6d33b6de87e419b17c88fbffbf00bfd62910baccf97b27974f90bbe8a0cf72cad3cbbd8b967ca396463c1719a9e7bcba35a2d2065a7b02153fdc6327e71fe5aaef321bfdee631e3a5743080274935938c3197ca5ada58028ff9e2e8195fd8fec57a1358cff5a0469ea7bd1b55b4e6c2ffed4bfff6144533881796b60ffe3546dc289cddbdd6e8219c1648ee262bfe5e48394ca7d1f5c041c87ddfdb31bde2d23748e8b88d053a491725b7744e8842be952ab0714b617cba94be221dd61742298d1f5dcc686571c204c9feddb0b97cc3dd6980de9d8a027aa11f662ad0f0711b0a5cfd3a1edf5cb8bd3a403d815fcc0793d480d71fada0d2c6a7805aa949ed1f46a9a1ac4298733c1225a489012a7d8ed09b665fe42cecf61f8767c581b4f0e03e73a649d8e0db849081e05b3d538ef773bcb07f8bb361076702fb5526eee73033b718ad66a92af31a9a108900e91591b698698e0bea6af8d54a3a8a8fa0eae92fff5b5f30903480ddaea612d6912d9995340a1743bc69924b3c9b9f649d709b3b1a5c5cf0b6bf977726c441b0535b74a9ee8f5427436fea8c8b4d947e742832b883a1708221e7d313ad23843fb70ce2fcf59fdad063cfba6520b5ab3649f5ed55503aae98cbdc40cae9f664f11afc72a5d4444abd9dddb2da0df948dd35f29e4dcf3a9108ee26c85f708c7d12a26957d764863ae934b52b2d9c375b8e9f0fa5a63a046792d62208dffa5bb810c0a02b3338a6fda455c864227d0b0475475fc0783b904a8cdb1042e79783ee8e8ddca362cf16c79a8703411907a02185702f5be8dd440c3dc11eda3a208c18eb3c8e0fd6563a01868c5b6bc6d7c032e9fa28fc64f205510c4d8682c06509367a9b9d4c7a3bac2af7e209a97ae86c301ecebddad5510cc47e0df6cdf50dad353edf6813f6693ac103a1d813953d5842b3afae0a67cbad6e3b5827155ebc0c75deb407b564504dfc4bda2376ccf6953de417b6d15c0f4e6ecf71aa6d61233c0a601d0cf4dba15031c3ddff655761a006632660d89a41b10121a6be7ac822fb1f73db933ad79a760b86c830ef453e4bbe3af474a19fc01d1340247dcd50e41186e3d05da4d056ac50c80e91b6c7011831d053ea2e4b90050f621617cd2e215abcbef10a3d2af91a2ed58e55b2624dc154de00a9e7ff5f0935a6f740c17b5a4421805278c32f69b564bade93e481ba7a3561d95cd4b878037d99f9c96e916b60c15c6789f897cb51ea7ef944a60a272a8beb6a7bdcbf2184840bd266992b5a44aa84adc5309785d09878e0155dcff162d42425109bcb0e16a06b2d95f2aea5c7592bc94065a2d15ab959a651fc5f99479c15c89d36b5bfb07e8c7f5b002572086cce11b14c056726912a3803f6aafcc2a0a8d0b8470f37fd40e88275768b1ba2515abe9a0ac72a96d84490904b0616b77a949b0d4cbe790af82d6d9b439c69c38b7546d671963f9aed760fdee3ed059048cfd9beb2f50b05441ba54e5ba0bd660a4ccdc58f028fdbc3ac40c8f1db276937f1b08f580c648a221dfc56b522efcad3f64857804c869af3695c226d5db3b5d3c090f81efd34d0473adce773dfdc738bf60205900d5f76a8d2625eeceb9c6fd509bb2801332815ddc68e3c2b3d8e16b919c70eddabd5e81e0c0e1480a0cb7bc91bb408ae0edc920e5996ba4f7d5c094e11b334e7f2050f9d2dc7995cc96fd7b05353c5a457a8226606df29116269cfc137b314187261eaa8609529d5e992a3273a8bec879d122ba59f2106f9035732008010e4aeb14af901e2c0960ab4e45e560008c902d57498d1316ba6ee08128b962f9b51729d0b7555d350e4683a32a6a8a22c183380e5ad695f217c40062910f065dbcd9953463cc8211a0aa6bc41c4c930aca560d1b391fc696aba9114d647dd1285eb67f2837011eb4deb9cf46ead05c76be9f7406999da18e72972526f3999a41d35c875a9849956cc93ae74f80d43dfe0305021126ed9beea2f8c0d46582ec714f852fa4d57eb6c1b419e79fee2f4bac2af0e3cb50b8f154ccf8fdae5edfc1b93773817c3414ceced7b3b0af8926b276d88ed60f582a996f7352ac72a303418dd4c5d70a992a1604a8533398df5bb2cb28fd43af6e6f57ac72f54302e3c28d400bc840c6daba385b47fd5ea662b572690acafbdc8eb642e77b244af7b3d891f406e6bd42f2df278826806884fafa15ecdd206314d8901d52f5109db429e75ba54781e9aa776d8a26217263cc9cab8c11d23ddd05187244b979196c25f921e88cbb66d8a678cd58df9b5c1a8cc51db7820d2a9e0fc7c9d7f86918805b7f9234c9edc8036db5610e9f6ca1778e2b7087262d02ad47aed9f3ea528336bdb025910a47032e0fdd51a1987dc0bb4777d4ade576c05b7857074e8c2d1648d44d2d93d1143fb94d6a975ec38b92d4390b9ad8d13b1756ce80b7b29d3605a177d84886d2cfe954dd69d550bf4e320c737ff3aef40de7f868686582f9c76c3c24f470e833a903baa2315f3048f47d01fabf757ddddaecb619f7c053a3f03fd32f4b43d0a5b789fb4cc65182bc8d37cb3872c90dde5e5c514f79634d2a194cb705811e65473e644681cf5ea97fe043b9b7e6ad801a7db1530c64d15f9a85c1a7e6fca4ac9a5ccd427ca5269e5e1a1457a20b6922651ce8ce12339be4134e8bdd433628177ca926fb555524fee63efcbbaac5f9c4f64d15d65e444b5316636d14189d31ce440fb247010430fba484ce57430a43306b60541e571fa3e84d418f0e1fb5490cfcabe5e8828965bc1d45ec5d23b499a44260984642eb1c15c16ab0b9d7c295dcbc2dc271ff0816248bc82d55225c163699e7d1fa7bbaf5c3f3b81f1661f65c74ee893d9cddd71f374713af0c1a54401d13249cdf0b5b32b3fd41f22b50ca813eb5515c58fa2ec69f3b57b0ef5c460dcaa9249d8953776fb1060f39ba6e4bb446e2943556fa698f67f57d5ce5865133d99e347203b4f1270b1c6523569d8a73ed9be2be883dc6ad2ca797e4681aac6f0db7654899c122e81e0972651c1b7aad5d394bda2bb0f15b141aa3b700d83d5c14e4ad0c4bd3f57277f3f6dca0e592219f0c7826c04dcbce718498c739a0b41943a071dcc75f7358fa64cde0e44074e2dfebd238fa9724788383a95c1bd33d7cdb1a2739f5b04c616e1525c647ccb5e963820a7405fbb3f9ab7272d24ee54859bbf9cedb0a10d90bf0870f0eeb0557fd208dad05d1c7dd5c8e31b463568e469441ebbed4a5f3d5159b545d5c834947e8112142ddda3992a9f63f90162b26eba35279dca82ad9a1e153c5310938b7a4dce09a92796ae338d81f0f381bad2a61eab854ca9c9dbf5ffc892f61b971e9f739678291ef24350421700f99672e06030841c87898d87ffe2a412ce76b03b35e7d14c53150956012b5a49b414d9d8ed4887bbb95ad1995243e753d575abc91e6a2934358e38e1b329ee25847b0949783223c0cbddb33251f2b58f74630be364560a3a07dc4496c7611a704892592ffb9a757fcd4905b3e33088bc20f869f520b44e97441229f4ad54b479d11e1711dc67adfa0a7d0d24a4717000eef96fadc17169dbbac05ec1e51c4b085455651e558886880d1bb6ce16bc5a9dfc0c2830bd75390edd1a7673f699132e140aa7037e2ec2a81c99920c555b87b50e059ededccc86f803c4e9722ffd66d2be2962b84dddb76c86c8cf515d8fccbc71e4e8d9386d6d93182677a74de97339cde6dc3d63a044c9c1f60fa7f67b82eb1f1b4c7f89741bda314c18307368d5598edc6b749b129263952baa41ccfd3bba3c4fbabe9432b6b1fe0fc9783148c33f29a4ce11dd5c030c7c55c987f324dbb478b9e4e2f0b60be1ecb461909d24bc2f0dbbe5b5aa5531818e917957c44841b297995310d9d06d0a3c6f0514c8947133f89105edcae103986809cf684cd4d3f4e79b2c7133f658757d7682eae08b89ba8d62947bee56ac71f9873556f774c397e7629a6c6c838643ac9dc528159ef49532bdc95b088b26dc827c767b390c7b668a788773611466e3505cf94d4bef13afe332f3f364788b22e5b466f703ee05d7c2addab7381fe6913de4e54c272673e802a64dcc437c8c29816385b5f8a79eb90e961b71bbe5b359f79f9aa9d295de7bed81cebb3abf9bb8a4b3fab34f89a5286a2168e5c26a1b3b8b2bdadece4eee2e3cf72160dc3fb7035bc7eabf77f9dbb95ac1c26e8574d42d2b6e981aca0a24d44bea9a451275d3926b7a3c617241378aa5bdf61a9d7ba1859698e87b821f92f6c671724159618c27640e095758b0e847a9a35a2357f3163927a1ea83923afa586ff1e4a4a356b7235230a9d3dc961bfe1d9945f8d1f990b34e3e1dfdb711e50b2940929506e102548db250a8599e5b148d9cb2ea1056236aeeab7123cfee864c84a28964da0f0f70605e819dbebcf001a852dfb465ce5446e243754b144ef7592c28cb2f40bea8f4adf3b3fb0882c46ff42bd70b417d8b6943f8d77c4e0cd5b3c4b699999f7e8dd0f389abef04594bed808c60aa87c0b89e7d8e262ab0b65b6451cddab5c379d6a2045b7d386d9b0a601324d159ce4ad3d029d36e38a8eb33a9a037fe250eca3d96233a168f954cf643f0976923b92e4f04df84aab0ca479bc5671032922d2fdf36b141d9b579bedacf45812f06730f138a362e873ba01cf011eb77b5377f5a00938ef129dda76def721154d3d55bae38a4d8b3c046f898c528ba024fef4d037a1e45c795e246f9c47ca57d506b6674eb3fc393c7193dcbd253a593897ccb14ef8b73be14bdf8a3e36ee7b113bc5b32848ce7e348622948767d633ccdce0a113f4dcd18996cc0d8e5debcc79437b3c6025591721cc89afd17f72dbe87df96685a0ee5b9731088c972602c4b29fbad0661de2decd7f6df17092e20737fc42212e29d52e3852918b68d1e112b8512d5aa0a1386e9a8a55ee0840d0661f014d65b735534af8867df47a4423fbba8b90ac2233535bee4e82574c8e3c4be52a3e354e7f4b8da38f9396f6f05e6cff6f4fc486b6b628b1fa80367ed16c667e20b452b126f5220eefe357cd64bd2aee63aab54872b01270bf3e8cc423b5cab99e64a2e41a31f141432872f236ae6b11dec6bef8911b72d431801d9ef8bee17bea9cdf29c504dcdea20ca26137bf700b7e170e24d172c5e42a6f8f2fb535fcb56b6131356d6bc90b624f844479316a9359fc89ac58e8beb16507ea6e30f1e4e5c9b18b51b9007e11b7667f511a593e0a89836bad249b957dd42ff0e15f702b5b0040abc77c23cae8996b2cf19b1800028e5927759c5e1c82f9a78100fba46dc5bc5d17d9eb80739e4b12723507939de6d329261c4b64d0b2bd673b4fa68f8d9544837989216bee1ade8427061486f2569da649bf36483df04e9af95d4c1d2c185ba6ed3ea6fc6dfc38d430ec7003a97c0b15519fb3c42c05996ea68257683d1d4f504e9eaab6618b7a13fde0f32d2c6cf52", 0x1000, 0x9}, {&(0x7f0000002440)="de7a23f48b7b18434a1c4b253a5390e2bcd6dba8350d1d1d32b9e07cd27fd4088b3cba37fff3ac38373b7075dc08553cea13e8640da732a0b1654bb72e8a7dd6aebdbe6c0196659983a343b90b5621cd5c4a4322898c6fbac31004f4de23cefb58413a49b7391d5d74ac26454607cd14d5e6e27cfca815720b368f495ea58510b3df284d7dee4ecf33f7d2c427de7a34f0725eefcc81db140e8cd4d32f2a23027fae3f1a7e37c0be039aed6faa70c01cb4a0e61426b421d5024e9977c00296d78d004b9f", 0xc4, 0x3ff}, {&(0x7f0000000100)="4809081d9f3db3e6ed57d45a6479e671586f85226ec71cce622bac970cc96e30ecca2838de8faa65312c8adeb7281e206a4a00dc1507c2d4f1256ab3a7fc8fecfb60c3fd4eea", 0x46, 0x7ff}], 0x20, &(0x7f0000000180)='\x00') 06:02:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="b7d9574bde4ac75a98edc832ab73911f7b552d99ece1dec276efbc0892ec284d53a1bcf3c83e424a88991c6ea3638af59dbfc5dbda9bff9b5315b3a88ee10d7e85b60e770764bf3c1e6df8e4d062d8d3365a5aa18fcf50aab52f6eecff43fa5f9c8c154315b9678381c0cd95be2836b3eb07a53e06c2604aa03c", 0x7a, 0x3}], 0x20000, &(0x7f0000000440)={[{@quota_account='quota=account'}, {@norgrplvb='norgrplvb'}], [{@uid_eq={'uid', 0x3d, r0}}, {@hash='hash'}, {@uid_gt={'uid>', r2}}, {@fowner_lt={'fowner<', r4}}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, 'btrfs\x00'}}, {@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'btrfs\x00'}}]}) 06:02:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 435.181122] FAULT_INJECTION: forcing a failure. [ 435.181122] name failslab, interval 1, probability 0, space 0, times 0 [ 435.205535] CPU: 1 PID: 7896 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 435.213333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.222670] Call Trace: [ 435.225251] dump_stack+0x1b2/0x283 06:02:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x3, 0x800}) [ 435.228874] should_fail.cold+0x10a/0x154 [ 435.233018] should_failslab+0xd6/0x130 [ 435.236988] kmem_cache_alloc+0x28e/0x3c0 [ 435.241131] __kernfs_new_node+0x6f/0x470 [ 435.245283] kernfs_new_node+0x7b/0xe0 [ 435.249171] __kernfs_create_file+0x3d/0x320 [ 435.253579] sysfs_add_file_mode_ns+0x1e1/0x450 [ 435.258242] internal_create_group+0x23b/0x7e0 [ 435.262914] lo_ioctl+0x1108/0x1c00 [ 435.266535] ? loop_clr_fd+0xac0/0xac0 [ 435.270417] blkdev_ioctl+0x91d/0x17c0 [ 435.274288] ? blkpg_ioctl+0x8d0/0x8d0 [ 435.278153] ? trace_hardirqs_on+0x10/0x10 [ 435.282386] block_ioctl+0xd9/0x120 [ 435.285994] ? blkdev_fallocate+0x3a0/0x3a0 [ 435.290306] do_vfs_ioctl+0x75a/0xfe0 [ 435.294087] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 435.299691] ? ioctl_preallocate+0x1a0/0x1a0 [ 435.304100] ? security_file_ioctl+0x76/0xb0 [ 435.308499] ? security_file_ioctl+0x83/0xb0 [ 435.312886] SyS_ioctl+0x7f/0xb0 [ 435.316228] ? do_vfs_ioctl+0xfe0/0xfe0 [ 435.320186] do_syscall_64+0x1d5/0x640 [ 435.324058] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 435.329231] RIP: 0033:0x45c9f7 [ 435.332401] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 435.340091] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 435.347337] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 435.354583] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 435.361825] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 435.369085] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 435.389721] print_req_error: 19 callbacks suppressed [ 435.389726] print_req_error: I/O error, dev loop4, sector 0 [ 435.420227] print_req_error: I/O error, dev loop5, sector 0 06:02:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="395b08877883b2a01f33302bdfe14d36526ad0e45450c96b275f190a87cf14b4ad6168e599b57b260c7af7233db9135b49cf77fa211a4b184156fbc3bbfc", 0xb, 0x4}, {&(0x7f0000000080)="124162e1dd51f41c55f2e0fbc928f47a7d6e96d140b00caaea10701a39186ec9d8f504255e8b9e58f62e5f93a3ae4d1f87449ee339ae12ab369e49fcedc8a17364fae7f0e4868ac51c4c635edf3a8d4ce70b6d5010b8ee01c306b8a66189f8b86bf97efe", 0x0, 0x2}, {&(0x7f0000000200)="b94538ffec9180e43f0bed9452737a386d45a93289cfd691ae2d633205a3b0075eb368ea0485c76257d786a3fa4c651f8bddddca9de9d39fced9b43497763253cbf718b740e9493f40d857de7f8f6baf185f101d0c3b92f00a45c6006a8b977a7f258e5ae4c845cc511d6e45df9e68f37d0c591bc67a0414e5b00a748bbfec732073c72773a3676396cf51e71b4333d59f52498ea328230b95c040543007395325d95644fb6fac02123efb0ed507a5ca1789e6125e26e31d3b7f54b7ef0e450188bcb618b53839f96f325af519cd8fb3b9b1843b5607ac", 0x0, 0xfffffffffffffffc}], 0x280029, 0x0) [ 435.442788] print_req_error: I/O error, dev loop5, sector 0 [ 435.449614] print_req_error: I/O error, dev loop5, sector 0 [ 435.455543] print_req_error: I/O error, dev loop5, sector 0 [ 435.464724] print_req_error: I/O error, dev loop5, sector 0 [ 435.470891] print_req_error: I/O error, dev loop5, sector 0 [ 435.476811] print_req_error: I/O error, dev loop5, sector 0 [ 435.482815] print_req_error: I/O error, dev loop5, sector 24 06:02:32 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$FBIO_WAITFORVSYNC(r0, 0x40044620, 0x0) [ 435.617756] BTRFS error (device loop5): superblock checksum mismatch 06:02:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363a0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x35, 0x10000}], 0x1, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', 'btrfs\x00'}, &(0x7f0000000200)=""/140, 0x8c) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) [ 435.679158] BTRFS error (device loop5): open_ctree failed 06:02:32 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 435.809055] FAULT_INJECTION: forcing a failure. [ 435.809055] name failslab, interval 1, probability 0, space 0, times 0 [ 435.828422] CPU: 0 PID: 7944 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 435.836212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.845542] Call Trace: [ 435.848113] dump_stack+0x1b2/0x283 [ 435.851724] should_fail.cold+0x10a/0x154 [ 435.855852] should_failslab+0xd6/0x130 [ 435.859803] kmem_cache_alloc+0x28e/0x3c0 [ 435.863944] __kernfs_new_node+0x6f/0x470 [ 435.868068] kernfs_new_node+0x7b/0xe0 [ 435.871940] __kernfs_create_file+0x3d/0x320 [ 435.876334] sysfs_add_file_mode_ns+0x1e1/0x450 [ 435.880981] internal_create_group+0x23b/0x7e0 [ 435.885544] lo_ioctl+0x1108/0x1c00 [ 435.889153] ? loop_clr_fd+0xac0/0xac0 [ 435.893016] blkdev_ioctl+0x91d/0x17c0 [ 435.896875] ? blkpg_ioctl+0x8d0/0x8d0 [ 435.900736] ? trace_hardirqs_on+0x10/0x10 [ 435.904952] block_ioctl+0xd9/0x120 [ 435.908552] ? blkdev_fallocate+0x3a0/0x3a0 [ 435.912847] do_vfs_ioctl+0x75a/0xfe0 [ 435.916797] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 435.922394] ? ioctl_preallocate+0x1a0/0x1a0 [ 435.926782] ? security_file_ioctl+0x76/0xb0 [ 435.931164] ? security_file_ioctl+0x83/0xb0 [ 435.935543] SyS_ioctl+0x7f/0xb0 [ 435.938882] ? do_vfs_ioctl+0xfe0/0xfe0 [ 435.942828] do_syscall_64+0x1d5/0x640 [ 435.946692] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 435.951854] RIP: 0033:0x45c9f7 [ 435.955015] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 435.962695] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 435.969939] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 435.977180] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 435.984421] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 435.991661] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 436.038044] BTRFS error (device loop5): superblock checksum mismatch [ 436.093349] BTRFS error (device loop5): open_ctree failed 06:02:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r2, 0x80006) r3 = socket(0x11, 0x800000003, 0x8) finit_module(r3, &(0x7f0000000180)='bbr\x00', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r4, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1f}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40010) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000240)={[0x9]}, &(0x7f00000003c0), &(0x7f0000000480)={r5, r6+10000000}, 0x8) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r4, 0x200, 0x70b527, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x7}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000080)={0x1, r2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001800dd8d00000000e3ffffff020000000000fe02000000001400090008000000", @ANYRES32=0x0, @ANYBLOB='\b'], 0x30}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001800dd8d00000000e3ffffff020000000000fe02000000001400090008000000", @ANYRES32=0x0, @ANYBLOB='\b'], 0x30}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}, 0x1, 0x0, 0x0, 0xc1c1}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getchain={0x2c, 0x66, 0x300, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r6, {0x1, 0xfff1}, {0x0, 0xfff2}, {0xe, 0x7}}, [{0x8, 0xb, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x84}, 0x800) r8 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x24}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x70, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3f, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xed, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x70}, 0x1, 0x0, 0x0, 0x408c0}, 0x5) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:32 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 436.208930] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 436.241313] FAULT_INJECTION: forcing a failure. [ 436.241313] name failslab, interval 1, probability 0, space 0, times 0 [ 436.278427] CPU: 0 PID: 7967 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 436.286316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.295658] Call Trace: [ 436.298241] dump_stack+0x1b2/0x283 [ 436.301866] should_fail.cold+0x10a/0x154 [ 436.306011] should_failslab+0xd6/0x130 [ 436.309981] kmem_cache_alloc+0x28e/0x3c0 [ 436.314129] __kernfs_new_node+0x6f/0x470 [ 436.318271] kernfs_new_node+0x7b/0xe0 [ 436.322154] __kernfs_create_file+0x3d/0x320 [ 436.326560] sysfs_add_file_mode_ns+0x1e1/0x450 [ 436.331237] internal_create_group+0x23b/0x7e0 [ 436.335822] lo_ioctl+0x1108/0x1c00 [ 436.339445] ? loop_clr_fd+0xac0/0xac0 [ 436.343322] blkdev_ioctl+0x91d/0x17c0 [ 436.347197] ? blkpg_ioctl+0x8d0/0x8d0 [ 436.351075] ? trace_hardirqs_on+0x10/0x10 [ 436.355318] block_ioctl+0xd9/0x120 [ 436.358936] ? blkdev_fallocate+0x3a0/0x3a0 [ 436.363257] do_vfs_ioctl+0x75a/0xfe0 [ 436.367054] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 436.372671] ? ioctl_preallocate+0x1a0/0x1a0 [ 436.377082] ? security_file_ioctl+0x76/0xb0 [ 436.381490] ? security_file_ioctl+0x83/0xb0 [ 436.385892] SyS_ioctl+0x7f/0xb0 [ 436.389247] ? do_vfs_ioctl+0xfe0/0xfe0 [ 436.393216] do_syscall_64+0x1d5/0x640 [ 436.397122] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 436.402299] RIP: 0033:0x45c9f7 [ 436.405479] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 436.413178] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 436.420434] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:02:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x800, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x8000}}, {@max_read={'max_read', 0x3d, 0x833d}}, {@max_read={'max_read', 0x3d, 0x101}}, {@default_permissions='default_permissions'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'btrfs\x00'}}, {@dont_hash='dont_hash'}, {@obj_type={'obj_type', 0x3d, 'btrfs\x00'}}, {@euid_lt={'euid<', r6}}, {@dont_appraise='dont_appraise'}]}}) [ 436.427690] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 436.434948] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 436.442207] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 436.457667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 436.513525] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pid=7964 comm=syz-executor.2 [ 436.517406] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 436.620490] BTRFS error (device loop5): superblock checksum mismatch 06:02:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f00000009c0)={0x3000, 0x1, 0x7, 0x1f}) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) recvmsg$kcm(r0, &(0x7f0000000980)={&(0x7f0000000080)=@sco={0x1f, @none}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)=""/144, 0xffffff05}, {&(0x7f0000000340)=""/245, 0xf5}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/233, 0xe9}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000640)=""/231, 0xe7}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f0000000740)=""/133, 0x85}], 0x8, &(0x7f0000000880)=""/210, 0xd2}, 0x0) 06:02:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x540c1, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f00000000c0)={@fixed={[], 0x11}, 0x9}) [ 436.685286] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 436.708513] BTRFS error (device loop5): open_ctree failed 06:02:33 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 436.756363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pid=7980 comm=syz-executor.2 [ 436.807431] FAULT_INJECTION: forcing a failure. [ 436.807431] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 436.819345] CPU: 0 PID: 8019 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 436.827129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.836473] Call Trace: [ 436.839065] dump_stack+0x1b2/0x283 [ 436.842710] should_fail.cold+0x10a/0x154 [ 436.846941] __alloc_pages_nodemask+0x22b/0x2730 [ 436.851689] ? depot_save_stack+0x10d/0x401 [ 436.856007] ? __lock_acquire+0x655/0x42a0 [ 436.856260] print_req_error: I/O error, dev loop5, sector 0 [ 436.860224] ? __lock_acquire+0x655/0x42a0 [ 436.860233] ? __kernfs_new_node+0x6f/0x470 [ 436.860240] ? kernfs_new_node+0x7b/0xe0 [ 436.860252] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 436.860261] ? trace_hardirqs_on+0x10/0x10 [ 436.860271] ? __mutex_lock+0x2cb/0x1430 [ 436.860299] ? kernfs_activate+0x2a/0x180 [ 436.895733] ? __mutex_lock+0x2cb/0x1430 [ 436.899792] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 436.904625] ? kernfs_add_one+0x2e5/0x3a0 [ 436.908772] cache_grow_begin+0x91/0x410 [ 436.912829] cache_alloc_refill+0x28c/0x360 [ 436.917168] kmem_cache_alloc+0x333/0x3c0 [ 436.921310] __kernfs_new_node+0x6f/0x470 [ 436.925452] kernfs_new_node+0x7b/0xe0 [ 436.929339] __kernfs_create_file+0x3d/0x320 [ 436.933739] sysfs_add_file_mode_ns+0x1e1/0x450 [ 436.938403] internal_create_group+0x23b/0x7e0 [ 436.942982] lo_ioctl+0x1108/0x1c00 [ 436.946602] ? loop_clr_fd+0xac0/0xac0 [ 436.950484] blkdev_ioctl+0x91d/0x17c0 [ 436.954373] ? blkpg_ioctl+0x8d0/0x8d0 [ 436.958266] ? trace_hardirqs_on+0x10/0x10 [ 436.962506] block_ioctl+0xd9/0x120 [ 436.966123] ? blkdev_fallocate+0x3a0/0x3a0 [ 436.970438] do_vfs_ioctl+0x75a/0xfe0 [ 436.974232] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 436.979858] ? ioctl_preallocate+0x1a0/0x1a0 [ 436.984269] ? security_file_ioctl+0x76/0xb0 [ 436.988669] ? security_file_ioctl+0x83/0xb0 [ 436.993071] SyS_ioctl+0x7f/0xb0 [ 436.996426] ? do_vfs_ioctl+0xfe0/0xfe0 [ 437.000395] do_syscall_64+0x1d5/0x640 06:02:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(r1) setsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000080)=0x9c5, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r2, r3, 0x0, 0xff7ffffe) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x3) [ 437.004284] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 437.009464] RIP: 0033:0x45c9f7 [ 437.012639] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.020336] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 437.027595] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 437.034852] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 437.042113] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 437.049373] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="ccea5827d808d6900af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x12, 0x0) [ 437.084942] BTRFS error (device loop5): superblock checksum mismatch [ 437.148475] BTRFS error (device loop5): open_ctree failed 06:02:33 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffff7, 0x8, &(0x7f0000000680)=[{&(0x7f0000000080)="9671b7849970fb8d93697f22dc707700c1099db18b532a321c89f9e8fe4d746c26b3de685eb418e60725f4dd82fe40dad076110bf0fb9e04e2abef7a331100f4883290126d91d018beab08db2d7e27366197d4381c36382f29a73de44df817697f18367bffa57c549bedc420f13c73e79b9155304272bd00bf89", 0x7a, 0xa7}, {&(0x7f0000000200)="60b6909356e7177ef0f259d928cdfde242eea51de84d2ee86b70bd42db839a2756fca7c25e1723aa1e9c538662106044172b382b2e187ebe000199819807efd2b3dbd35edb6f58e353f46ec9b6c9284c9c8c8c508d44ecbf8ed50a3835c72a13937cb219f0941b6078167c036a0737071732f4f918ba9f59b6147343ff067b680e8478bdc7dc5f3d775ebfef785bfb0a8a04de5a330df1bea589d42566eb1fd8d99506227de374ae12ef8ecb33979821ef62c6e22daec40a95b55ba3b36d5c2ee7467f750d6cc153f726995b986bbda289c3075f15b831350b251e2dae3aed7f85eb0f45dca9", 0xe6, 0x29d}, {&(0x7f0000000100)="27aab49eece12460f6bfe23153132721a67fe887210007891f7bec4bd7d710c8248ce14f83948fcd05b789c815d04a445d586aa9ca959307f2e1a87a9243e687188404908833618f30e22251e38c557aa33c17ae1cc1bc903a23607a620c20eb2cd38edc6bb8d62cf7ff7c9b58b4a05d3bffe3786397ad89f38ce5519cc5b9e998b90dc1fcc74b05502676cabb2ee6fee2c5a0a427c1888523b95af7ff2b2320966f313ed6cffe85f272a931861fa6c949246b5be7e8ae", 0xb7, 0x2}, {&(0x7f0000000300)="267ab1433b02c29093b0c132aa441e378989b1fd3c6a9dcb61b5c530a2ba9388a0d7a45c23a54c67a2ad0bc60714f10923423bfabe94f37f3854127c9c1fefb8d89f0ad815416266a3c6bbdf1a499dfd546c16dcc29ba612d502e2f4ffbd02ca243312a21eec6acdf082bd307be0d409682336b65df90e2e9d6afb84dfbf29aca58261939099d271d27854ebf811faab7a6286be00582b76f882806d560aec75e186bc16fa176da6b4f624c9e99b1ad5f380a2bc67e5c38237c61f51d8a5685696e24be11dcbc5918019fab0cec0d537ed0fe53f7c6bd81f", 0xd8, 0x100000000}, {&(0x7f0000000400)="fe291af1cfbda5808987bc3bf3feeffed7fc6ace0dae2fb35179603c60faaf6c4355d674f99f00a83c296ff92932d3ecb9f7645c2b97def10bc63e36154c563fa1bca6f755253c2418c93974a1c10ff0af5c1d19eb82aca41a0bcab67f6fed14ad461954f1a2e43ddddde6a2030b0f91b13411", 0x73, 0x6f77}, {&(0x7f0000000480)="351e44cedcbef04a6a1d6ab83e98b32b5ff80b7a92182b592b20e7a8568b134b92abf1e63d1672b24064a9901ab18efa172b2b6d71d96d43b02f641e31614288fd62a20c3b5ded3950d6ef41639fa91d14978806a59d1b17752fd3711115c1732a9e170d830ceb7952503d7ea819ed75b29bf43ab68be760599973faa22b6104bcbe0693ead0059f39aea14cc5f590653097173a41c90e917935baade7369e001eda2aaa8a4739c6855bab51f5fb95159a0ca842384ed8914d5d9cc90fc196efecbc8573042558f3e2e441313d08f143325421675c4a1e17adc247d1243173cd", 0xe0, 0x1ff}, {&(0x7f0000000580)="31978db4fb3c9f15b75dd2b2753bda5039a29ed1514bdc318942f46f14bd23b886d6e8608ec9846abfd0410b465bbbab20e39b5af92c3ccb379d679e386593fcd82caeaf6b7d1d6ed4e7eba4d209f1ea9476252d39a147d3b6360483b33bd3e776ea43387bfe40dc6a797ecfd603ff0f53b9e44120a1734248a92a249207e807", 0x80, 0x3ff}, {&(0x7f0000000600)="d4ce6a7d1a1917bd4bc15e68439a1b35fc87cb4f5d5933d2ed5ef2b3250c7e1e44c49442fc7b97bc2f0fa2cfe10546b7542d345836b445705a8396835174f39f7de7126f0bbcfd4b7bfc2a9a64eb", 0x4e}], 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000740)=""/88, 0x58) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) connect$phonet_pipe(r0, &(0x7f00000007c0)={0x23, 0x20, 0x1, 0xe}, 0x10) [ 437.292463] FAULT_INJECTION: forcing a failure. [ 437.292463] name failslab, interval 1, probability 0, space 0, times 0 [ 437.336173] CPU: 1 PID: 8055 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 437.343980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.353324] Call Trace: [ 437.355911] dump_stack+0x1b2/0x283 [ 437.359545] should_fail.cold+0x10a/0x154 [ 437.363694] should_failslab+0xd6/0x130 [ 437.367666] __kmalloc+0x2c1/0x400 [ 437.371203] ? kobject_get_path+0xb0/0x190 [ 437.375436] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 437.380886] kobject_get_path+0xb0/0x190 [ 437.384947] kobject_uevent_env+0x21e/0xc50 [ 437.389275] lo_ioctl+0x1177/0x1c00 [ 437.392905] ? loop_clr_fd+0xac0/0xac0 [ 437.396807] blkdev_ioctl+0x91d/0x17c0 [ 437.400690] ? blkpg_ioctl+0x8d0/0x8d0 [ 437.404573] ? trace_hardirqs_on+0x10/0x10 [ 437.408810] block_ioctl+0xd9/0x120 [ 437.412426] ? blkdev_fallocate+0x3a0/0x3a0 [ 437.416735] do_vfs_ioctl+0x75a/0xfe0 [ 437.420536] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 437.426151] ? ioctl_preallocate+0x1a0/0x1a0 [ 437.430651] ? security_file_ioctl+0x76/0xb0 [ 437.435051] ? security_file_ioctl+0x83/0xb0 [ 437.439447] SyS_ioctl+0x7f/0xb0 [ 437.442802] ? do_vfs_ioctl+0xfe0/0xfe0 [ 437.446775] do_syscall_64+0x1d5/0x640 [ 437.450667] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 437.455848] RIP: 0033:0x45c9f7 [ 437.459073] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.466775] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 437.474153] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 437.481437] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 437.488699] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 437.495962] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0xc0000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{0x1, 0x2, 0x2, 0x2, 0x6}, 0x1800, 0x40, 'id0\x00', 'timer1\x00', 0x0, 0x0, 0x100000001, 0xc140}) 06:02:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001800dd8d00000000e3ffffff020000000000fe02000000001400090008000000", @ANYRES32=0x0, @ANYBLOB='\b'], 0x30}}, 0x0) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={r0}) sendmsg$key(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="020701080900000025bd7000fcdbdf25020013000900000026bd700000000000050017003c0000000a004e21000007ff00000000000000000000ffffac14143c0800000000000000a829c66eba399e619b76f22450101d41d49143532628e399839a2af94c78065a636c130e7e09cce5e26c261654af2a82ecbaef08ac7f7e1193aa3f3aadde03d537a5c2f3c012f7685a5aa8051af52f4557ae982b085f1a77a380284eb6ed"], 0x48}}, 0x1) r3 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r3) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) fstat(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r5, 0x80006) r6 = syz_open_dev$vcsa(&(0x7f0000000880)='/dev/vcsa#\x00', 0xda, 0x109400) ioctl$KVM_GET_DEBUGREGS(r6, 0x8080aea1, &(0x7f0000000800)) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/autofs\x00', 0x101000, 0x0) sendmsg$AUDIT_GET_FEATURE(r7, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x10020}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x10, 0x3fb, 0x200, 0x70bd29, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) syz_mount_image$afs(&(0x7f0000000080)='afs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000100)="0496b0a22b92de11c2d46c5539ebf414b8f7f1a18525e469c2f0bea213341868b40749338401c335ba1a9b25cf8b452e4dbfa97cd0da1ec8211188ce477f0bd691c0f23721c42ca34c18ebe33eade0343f477c56dba9a9b8fdbffe42812d0a623b0b68370ff5f4793ce5b8f1f6666847a623458c425cb50aab5fd6499b3219690abfb638a67bb275bfc955ec462b9d7b71effb8aa441606324a12df496", 0x9d}, {&(0x7f0000000200)="1a618abe06739c896ab6bd97d18632a10d955bdcee27f249ab985ac8d4eb175d22a28e4988118f63bdf16cf1d6eacab844a615a66eb54cebc7f4a1727cd065515d", 0x41, 0x8}, {&(0x7f0000000340)="500bc9af1c1dba9ccf8958a7eb502979eb67e5184e9983f8a44d3aa5daf879bc3b61727e6d687eb0666843ffb1981814ff36fb64887c1e929e1acbb9d62ce3a4839aed9070f9c8eca0ea45bb6a09940a90d1932f97bfa23785dd5d5d36e8bd76d26de12ec45ecd5757c8c1af818d2373cd86c27450805f236c58f0946c29c1a52236", 0x82, 0x8}, {&(0x7f0000000400)="605380b6ff2463b394c58c039a385e623b204ede902e305f1557373db7f460b353a08d43776498ae5d048aca727ba3317ed977e52bf6c1f32f07b731a6d01d7ae697a83c38423cbdc2f7e4b62eb15f1be6a2019b58c3a9f58e67c36210ae2951d47259f67d7d067b5ac447a78b7b26a6539d770ca1bc69cd90279a1c77d568424c66fe545147604807a4179361b4f1ecb9a66bcf2ff207471767fa49b20dccda32ef38c15e66590c67362b08bc8b01450629a9b70b6072e9a214d10315e1551a5a52c122c1ead27e48955d6b7f179a91d4a2c8eb035ff5727e236b46f2b9986f78cf800ab4b9d944ee", 0xe9, 0x3}, {&(0x7f0000000500)="36da8383ede25c5ec29a7a6c4221e54951c1b3842accd4da3b9eac37b3f69845ad960e9a5225f3eff9c2124cac17083880044260675e76b06bebe8f830ee1525dff7eca62e5ba3458f9143d147c9574cdb37d736e36e78eefe9143c39adedf126e5fd48ef42938a3250a9d08fbbaf3bcd1f04e6072a15edb0ff87183184855a4034a31234c6ac33219d53637a315206806b6c2193a96537a8c6bd361e6b8efc9cc0b6d71f1dab117069e769dc503c18747969493c1789da0a1df3ce661102f6e697c784a50c1234a78590c16d375d0a75bad975e04f627678a1590a168673ee103e3f08082433bdd48f8", 0xea, 0x3d}, {&(0x7f0000000600)="18147d4a5c58977204caea5de6a91ea9798370f43bb66d784e432567612d358b1b9c02e193592623f68ad4c0ff140a98e067ce4f6fc7cb0fa6ffa097828a6901172f5cb5c4822959d2eee39ce696de3a2a1edd31e39199b046c68746dee68f7879c9a228290804e2c4316a35af3d6fa301f88990afe72efb06d7dfc74066ee16d3b257ddcc68b20d38405a1c2f", 0x8d, 0xa5e}], 0x20, &(0x7f0000000e00)=ANY=[@ANYBLOB="64796e2c666c6f686f3d77726974652c64796e2c666c6f636b3d6f70656e6166732c666c6f636ba848d4d8209b03686c6f636b3d6f70653154dd4589da6e6166732c64796e2c6575696c3c36f9ba1c785ad798ffeec260e790d5da3beadcd1222c5bda2297f997d5f587044d4d166a0f6bcc2266c0bd5ff4e28b2544", @ANYRESDEC=r4, @ANYBLOB="2c736d61636b6673666c6f6f723d6274726673002c7375626a36cb73295962228f2b8065723d2c736d61636b6673666c6f6f723d5d26402f2c61707072616973652c6673757569643d3336301c22cf5d69961a9cd8c499ca573d336435312d376363372d633110662d663161612d65616636393561322c6f626a41747970653d6274726673002c7063953d303830303030303030"]) [ 437.786029] BTRFS error (device loop5): superblock checksum mismatch 06:02:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x24001, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x836, 0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000100)={0x4, r1}) [ 437.841946] BTRFS error (device loop5): open_ctree failed 06:02:34 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000080)) 06:02:34 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:34 executing program 3: timer_create(0x5, &(0x7f0000000100)={0x0, 0x41, 0x2, @thr={&(0x7f0000000000)="2f743a91c3c37275ecbe4aec734ba3f395882b9aee6612ee6ab315cc794673371d0bd600bf80e38a519aa6c5f0b0519e6b4de7d1daa5cb37c25bba28043b479cd955fb5dd9d5df787a97ba44887c3e2a389c", &(0x7f0000000080)="57ba3ec000580a62104c259c7ea08441d9024db1be87360585ef97729494f3cb1cfdf08e57110541c7823e1dcd07338f0fb073216f38894caafa3c927ca7d6c98dedbb4d000a980b8474addf1bf7bb952b8dde03a6706b831a12d289d6beb78c138d2d93876a"}}, &(0x7f0000000140)=0x0) timer_gettime(r0, &(0x7f0000000180)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000200)=r2) [ 438.034550] FAULT_INJECTION: forcing a failure. [ 438.034550] name failslab, interval 1, probability 0, space 0, times 0 [ 438.070386] CPU: 0 PID: 8105 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 438.078278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.087619] Call Trace: [ 438.090201] dump_stack+0x1b2/0x283 [ 438.093825] should_fail.cold+0x10a/0x154 [ 438.097971] should_failslab+0xd6/0x130 [ 438.101941] __kmalloc+0x2c1/0x400 [ 438.105475] ? kobject_get_path+0xb0/0x190 [ 438.109701] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 438.115140] kobject_get_path+0xb0/0x190 [ 438.119192] kobject_uevent_env+0x21e/0xc50 [ 438.123509] lo_ioctl+0x1177/0x1c00 [ 438.127134] ? loop_clr_fd+0xac0/0xac0 [ 438.131018] blkdev_ioctl+0x91d/0x17c0 [ 438.134901] ? blkpg_ioctl+0x8d0/0x8d0 [ 438.138780] ? trace_hardirqs_on+0x10/0x10 [ 438.143013] block_ioctl+0xd9/0x120 [ 438.146628] ? blkdev_fallocate+0x3a0/0x3a0 [ 438.150945] do_vfs_ioctl+0x75a/0xfe0 [ 438.154757] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 438.160365] ? ioctl_preallocate+0x1a0/0x1a0 [ 438.164780] ? security_file_ioctl+0x76/0xb0 [ 438.169178] ? security_file_ioctl+0x83/0xb0 [ 438.173579] SyS_ioctl+0x7f/0xb0 [ 438.176937] ? do_vfs_ioctl+0xfe0/0xfe0 [ 438.180903] do_syscall_64+0x1d5/0x640 [ 438.184802] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 438.189981] RIP: 0033:0x45c9f7 [ 438.193165] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.200864] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 438.208116] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 438.215369] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 438.222626] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 438.229887] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x7, @loopback, 0x10000}, 0x1c) [ 438.282699] BTRFS error (device loop5): superblock checksum mismatch [ 438.345682] BTRFS error (device loop5): open_ctree failed 06:02:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=r3) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) sendmmsg$unix(r2, &(0x7f0000003680)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000140)='^1', 0x2}, {&(0x7f0000000200)="dbd3ed268565f83665a0c431f4b1cde1f7f9e3cf54127035e2c3dbeb02a10f28ec1d337cb854bb04e79feff007bc8b9887c9d48963354a7a2d3b8330d78e1491eef2eb47aa398d5b07e568e493d1d21f1c01c7b31159c49f0d90f0370d17ebba0dc411e7cf81966369c3aedf164115e0011c9b47305bc5292ecfeeec69104c", 0x7f}, {&(0x7f0000000340)="8751", 0x2}, {&(0x7f0000000380)="8845720ef16910fb27fdbc3459e716520a27e7ef31cd8c6efedd4f26a8c390fa5508a9d0dd6c6d338dc6446a8c84878cb0c735724318b73a4e634938992a0d64015e14182ea28c80d4b3cb6430bfdb5b281ea7ff476ae5d23811ed5a05deb08a1a81e900e5b94e3dff6ad510d370f590c786b7c8d3d6e1cb120c334372b9a2dda7d3ce7f005e9f71374c7488ae2535624f3b006331281280c9bc04a9849d63a959a33b3f4934198c4baab478aa217d65f349b724bbb8fc5d2ff86b13effa2080825b2ad4b85794", 0xc7}, {&(0x7f0000000480)="e82e168837639e64a22bd88b48d1ff0012eceb4f826472e0668f4a6155b3a308968b865331a7cc8ed37021085403d0ac4e180f7deba941e6c699b84b324ebba95b877241afbd0f7bbfb51ffc0b8f69cf8a6b0c82d0cd4be6ca15e316c395a7db7c2eef153be459e19989eba1ec42d16230f0ef18f0", 0x75}, {&(0x7f0000000500)="c5b34e0b9a224d839b660daae79e2cbd22a4150a6a2aa9e377534c9869fe894b08d6d0f90d4f27e5581b5ad804e69846dc3c109c673fba8a645df790f82784d49204e098c7499e3b2151890810", 0x4d}, {&(0x7f0000000580)="3d8886c4907a58ae68c860e9238ee641a1cfca0d7ba3ca889948b7303c6b5f6825c7582cfb013c72403e2c47521d2639750ff02fd0098867ece685b5834af02b5d8906b33313f4a1620fb37c816dc93f29d3208a5829c9f9e3e141fdbfb84736bc5192eb707e9fc03b1243da0e368f6b7ec477dd94ed8b9a80d87c45c865d77c6af7704760c43dae94a332abce0bc5f5e4a349f1cf2bac6b973d7d65476fdadbd60222fb027da26b", 0xa8}, {&(0x7f0000000640)="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", 0xfd}], 0x8, 0x0, 0x0, 0x20000080}, {&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000840)="8eb181f530877992060df60cf41f0058f7f3fe50ae139b9ed87d2e7a5282eba255", 0x21}, {&(0x7f0000000880)="b57061b1d124530b30365af0861e5067f210e8a9a5fc151acf2c", 0x1a}, {&(0x7f00000008c0)="015b95c1a15736efe409d2e2abf6b46e95e1b7ba2099484e806563349acffbf9d577943dee47a5775e31f13acd97b56411e247ff07980cd23d772b4f539dca857aa7e8e62485d0707aa4a8495cee37e2e2e2ad1a981e370e3467b0a2d2d35b47312278207d18c9318bfa5777c5114a996d6876d5d4aa7f165a99bb100781814ace3181acb42e6a93662d87df663bf45581684c7dc32bd2dd332656e7b5761f8c58d6821954d09c359027acd7d9ad983a404788ba8cc80fa1997f4cb810f00c92fd0cd3f64e66c14b3b4ec5", 0xcb}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000019c0)="0df2e0d1a845b16f596e9b27a82337c09fbfab8203062976eface84839ff76335e6d7fda1a77f6362a13976875c831b53149c835cfc14b61037a984e6466a79d7e4b0ada6172e631a4a95972de16d8a68bc22051bf208b7c2dc7386bf2fdacd3d48a678e5c817d458bc17915f56708defd8d559a0a04ad8d6e04e66d259c492975711f4d89a26efe7642f05b4cfac5ec8aeefc021afd484da824c9720a75a769f8936c3da31339e1b9c9f1f23e5a84c754a0dd83ce9e22b5c3ca9408385b66d70a6c720d8a8ddc76", 0xc8}], 0x5, &(0x7f0000001d40)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd8, 0x10}, {&(0x7f0000001e40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001f40)=[{&(0x7f0000001ec0)="08f5a7193a999436ade14b5986dc46040d49b818ffefc40643dbc47e4f1cb5ca82f5a24d314708b6d7b336ad8824dce8b9d56beb10b98cc9a49232cef7d8d28caf01f6bc795ce2c60151c181af1d6429c675c83c4c0260c461287438b8bd517cdb1ab7e954500209dd6483e3378270469b4ef8d198e935", 0x77}], 0x1, &(0x7f0000002080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r2, 0xffffffffffffffff, r2, r2, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r2, r2, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}], 0x138, 0x4000000}, {&(0x7f00000021c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003480)=[{&(0x7f0000002240)="7a704998529ede36e396e7b7f3a8b655f138d85dec4fd531c1d87876eda6025f71546a763df6056a73831bf38911f3c72cad8eccd50247a087d4d9d06bfcf584eba96dacec4862018380ed61507df9b9099eb57a8729bda1cd48933b72aff4f389a8eae4adfa5f1b40f9b26c7aa9e9a96e00ca9db03b36515cc11327e2ff0a4026023c7c4fd3919184edb097747111ddbc4ea746db5673d38a88ec81a789334666d73724e2219b292bab0143a9548e513db9e2834f8e298518297b65275bba4cbbf91b778b6669c2efd005ee11e8677e9113009ced45694812b6c9c6672db81843418c", 0xe3}, {&(0x7f0000002340)="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", 0x1000}, {&(0x7f0000003340)}, {&(0x7f0000003380)="8a18c99e89b3ceb28c07a5121964cd2481482c0aba85318c7bc2c91aac225c679b4fa53fa08b58aa1111c67bc4182e", 0x2f}, {&(0x7f00000033c0)="e92cc2e5baec5f40d9d8353d1cdd8a973e3118cb531444283dd5d6eabb52c167c791285dd7c3428a9cecd708a7405fffefdf1145e9ca8a9f65962e4a9e5d35245a5e05d956f82534d36dc579f5e93cbf1d2a77eebd14094fde3cc8926bc7d401d5f07cf6a39d56198fcc92b0800d3bff74df12124f9ed4dd047c32a3eec7f30d13f409", 0x83}], 0x5, &(0x7f0000003600)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r4]}}], 0x70}], 0x4, 0x4000004) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000080)=@null) 06:02:35 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:35 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000140)={0x0, 0x5a, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, r1, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0xc041) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:35 executing program 4: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000140)={0x0, 0x5a, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, r0, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0b5}, 0x40) prctl$PR_GET_DUMPABLE(0x3) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 438.506017] FAULT_INJECTION: forcing a failure. [ 438.506017] name failslab, interval 1, probability 0, space 0, times 0 [ 438.529634] CPU: 1 PID: 8130 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 438.537447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.546794] Call Trace: [ 438.549396] dump_stack+0x1b2/0x283 [ 438.553125] should_fail.cold+0x10a/0x154 [ 438.557283] should_failslab+0xd6/0x130 [ 438.561256] __kmalloc+0x2c1/0x400 [ 438.564790] ? kobject_get_path+0xb0/0x190 [ 438.569021] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 438.574480] kobject_get_path+0xb0/0x190 [ 438.578538] kobject_uevent_env+0x21e/0xc50 [ 438.582863] lo_ioctl+0x1177/0x1c00 [ 438.586506] ? loop_clr_fd+0xac0/0xac0 [ 438.590397] blkdev_ioctl+0x91d/0x17c0 [ 438.594279] ? blkpg_ioctl+0x8d0/0x8d0 [ 438.598168] ? trace_hardirqs_on+0x10/0x10 [ 438.602406] block_ioctl+0xd9/0x120 [ 438.606024] ? blkdev_fallocate+0x3a0/0x3a0 [ 438.610337] do_vfs_ioctl+0x75a/0xfe0 [ 438.614130] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 438.619746] ? ioctl_preallocate+0x1a0/0x1a0 [ 438.624151] ? security_file_ioctl+0x76/0xb0 [ 438.628546] ? security_file_ioctl+0x83/0xb0 [ 438.632941] SyS_ioctl+0x7f/0xb0 [ 438.636298] ? do_vfs_ioctl+0xfe0/0xfe0 [ 438.640263] do_syscall_64+0x1d5/0x640 [ 438.644145] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 438.649321] RIP: 0033:0x45c9f7 [ 438.652496] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.660187] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 438.667457] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 438.674718] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 438.681976] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 438.689230] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 438.725926] BTRFS error (device loop5): superblock checksum mismatch [ 438.808364] BTRFS error (device loop5): open_ctree failed 06:02:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x48000, 0x2, &(0x7f0000000080)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000000100)="57689728c8dfccd817fd761aee3f20b3d5214d60716ad413f255977fce4bf3912d7eb4c6942deec0d4fd449eecf65ebdb511edab8abfe6a37c04986d0c90ecdffc8d2963", 0x44, 0x100000001}], 0x0, 0x0) 06:02:35 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:35 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 438.943502] FAULT_INJECTION: forcing a failure. [ 438.943502] name failslab, interval 1, probability 0, space 0, times 0 [ 438.970885] CPU: 0 PID: 8159 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 438.978769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.988107] Call Trace: [ 438.990690] dump_stack+0x1b2/0x283 [ 438.994313] should_fail.cold+0x10a/0x154 [ 438.998458] should_failslab+0xd6/0x130 [ 439.002420] kmem_cache_alloc_node+0x25f/0x400 [ 439.006997] __alloc_skb+0x9a/0x4c0 [ 439.010620] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 439.015451] ? netlink_has_listeners+0x1ff/0x310 [ 439.020197] kobject_uevent_env+0x6d1/0xc50 [ 439.024514] lo_ioctl+0x1177/0x1c00 [ 439.028132] ? loop_clr_fd+0xac0/0xac0 [ 439.032005] blkdev_ioctl+0x91d/0x17c0 [ 439.035878] ? blkpg_ioctl+0x8d0/0x8d0 [ 439.039753] ? trace_hardirqs_on+0x10/0x10 [ 439.043992] block_ioctl+0xd9/0x120 [ 439.047611] ? blkdev_fallocate+0x3a0/0x3a0 [ 439.051930] do_vfs_ioctl+0x75a/0xfe0 [ 439.055728] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 439.061345] ? ioctl_preallocate+0x1a0/0x1a0 [ 439.065757] ? security_file_ioctl+0x76/0xb0 [ 439.070174] ? security_file_ioctl+0x83/0xb0 [ 439.074571] SyS_ioctl+0x7f/0xb0 [ 439.077926] ? do_vfs_ioctl+0xfe0/0xfe0 [ 439.081904] do_syscall_64+0x1d5/0x640 [ 439.085790] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 439.090981] RIP: 0033:0x45c9f7 06:02:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000480)={r6, @in6={{0xa, 0x4e24, 0x6, @rand_addr=' \x01\x00', 0x6}}}, 0x84) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r7, 0x80006) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r7, 0xc1205531, &(0x7f0000000340)={0x3, 0xffffff81, 0x2, 0x530, [], [], [], 0x4, 0x3, 0x8aa, 0x1, "fd339c680df4556a01a0d02535197e66"}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, r1, 0x711, 0x70bd28, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0xfffffffffffffd7c, 0x3, r3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED]}, 0x24}}, 0x4000) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xffffffff}]}, 0x2c}}, 0x0) 06:02:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f00000000c0)={0x20, 0x7d, &(0x7f0000000080)="0661", {0x4e, 0x3, 0x4c314356, 0x2, 0x1ff, 0x3d1, 0x5, 0x8000}}) ioctl$TCSBRKP(r0, 0x5425, 0x3) [ 439.094157] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 439.101865] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 439.109118] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 439.116381] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 439.123652] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 439.130910] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xff7ffffe) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e1d, 0xfffffffc, @private2={0xfc, 0x2, [], 0x10}, 0x9}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, r2, 0x0, 0xff7ffffe) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r3, r4, 0x0, 0xff7ffffe) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000240)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000280)={r0, r5, 0x3}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f00000005c0)="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", 0x107}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000700)="4c6b4c351b9eb335bf640b0059ebe52a961d797bdb382bcc3ce00f3d62d51a0d39ead47f9b74066bbcefa58d46345d45c46318113f1218e650e2b8576bd06802d60026f684d16689a90002145037f53b967401899f9447036b52480fb27a0b47ac78f35f908a390aa5bdc3987784e113b5aaa03ad413a20a85d29b8bab1609aa373a23d2226aa08057b9728492ec06e0", 0x90}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000480)="cce6fb766eb8716f08000000289a25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050adde615d4a74dd76d817ffc02e4757c2ceabf75f7f25d8b8cb5d95919982ba0469975a986ed3fa4eb3b194749c1e36689d46dad058f6d8c0ba2711acd7893f98412c3a916c9d2b1e906f7e6097f6794db8c50bb94e1abb2f265d8ad78fb19cb", 0x87}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f00000000c0)={@any, 0x1}) 06:02:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f00000000c0)="814324f4a69b01b17d68d015f64cd8768d982494952236084fdcdfdbaac793df254f0462074dc489a4fa91ea5c05f3eccfdd51a2be8f1f375acb9494260b5dd4215117050d7eaa7ec2bb6982fb6fe34099165c7c9e8fe5a81c1d91da86bd", 0x5e, 0x40}], 0x0, 0x0) [ 439.246023] BTRFS error (device loop5): superblock checksum mismatch [ 439.309338] BTRFS error (device loop5): open_ctree failed 06:02:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e20, 0x10000, @local, 0x8c}, {0xa, 0x4e24, 0x5, @private0, 0x2}, 0x0, [0x40, 0x2, 0x81, 0x7, 0x1ff, 0x200, 0x9, 0xfffff800]}, 0x5c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x24}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f00000000c0)) 06:02:36 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:36 executing program 1: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000040)={0x9, 0x401, 0x3, 0x101, 0xd, "c4340085a9ca036c"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000040), 0x11004, 0x0) [ 439.491779] FAULT_INJECTION: forcing a failure. [ 439.491779] name failslab, interval 1, probability 0, space 0, times 0 [ 439.530868] CPU: 1 PID: 8201 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 439.538670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.548009] Call Trace: [ 439.550602] dump_stack+0x1b2/0x283 [ 439.554223] should_fail.cold+0x10a/0x154 [ 439.558368] should_failslab+0xd6/0x130 [ 439.562334] kmem_cache_alloc_node+0x25f/0x400 [ 439.566913] __alloc_skb+0x9a/0x4c0 [ 439.570532] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 439.575365] ? netlink_has_listeners+0x1ff/0x310 [ 439.580118] kobject_uevent_env+0x6d1/0xc50 [ 439.584436] lo_ioctl+0x1177/0x1c00 [ 439.588054] ? loop_clr_fd+0xac0/0xac0 [ 439.591935] blkdev_ioctl+0x91d/0x17c0 [ 439.595812] ? blkpg_ioctl+0x8d0/0x8d0 [ 439.599703] ? trace_hardirqs_on+0x10/0x10 [ 439.603938] block_ioctl+0xd9/0x120 [ 439.607567] ? blkdev_fallocate+0x3a0/0x3a0 [ 439.611914] do_vfs_ioctl+0x75a/0xfe0 [ 439.615702] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 439.621315] ? ioctl_preallocate+0x1a0/0x1a0 [ 439.625736] ? security_file_ioctl+0x76/0xb0 [ 439.630146] ? security_file_ioctl+0x83/0xb0 [ 439.634547] SyS_ioctl+0x7f/0xb0 [ 439.637903] ? do_vfs_ioctl+0xfe0/0xfe0 [ 439.641867] do_syscall_64+0x1d5/0x640 [ 439.645752] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 439.650927] RIP: 0033:0x45c9f7 [ 439.654101] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 439.661797] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 439.669059] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 439.676316] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 439.683572] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 06:02:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r4 = fcntl$dupfd(r0, 0x0, r2) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) init_module(&(0x7f0000000080)='btrfs\x00', 0x6, &(0x7f00000000c0)='btrfs\x00') 06:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1004400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x10, 0x70bd27, 0x25dfdbfb, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 439.690837] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 439.761793] BTRFS error (device loop5): superblock checksum mismatch 06:02:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x400, 0x0) [ 439.829319] BTRFS error (device loop5): open_ctree failed 06:02:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x10801, 0x0) 06:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$FBIOGET_FSCREENINFO(r1, 0x4602, &(0x7f0000000200)) 06:02:36 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:36 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_VERSION(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB="04000000e3a7cd4800000000913342b32974f3a21cbdd452c77a", @ANYRES16=r3, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x60045}, 0x20004080) r4 = socket(0x11, 0x800000003, 0x8) finit_module(r4, &(0x7f0000000180)='bbr\x00', 0x1) r5 = socket(0x11, 0x800000003, 0x8) finit_module(r5, &(0x7f0000000180)='bbr\x00', 0x1) bind(r5, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xa8830000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x1c, r6, 0x200, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040040}, 0x0) bind(r4, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r7 = accept$ax25(r4, 0x0, &(0x7f0000001800)) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, &(0x7f0000001840)=""/4096, &(0x7f0000002840)=0x1000) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020027bd7000fcdbdf250400000008ff0000e00000010a0001006274726600000000"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4800) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:36 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="3dfc9e0add8891d5eafa97a97ebe73912c9ade2ca11bac8978b7372d59ff0c4fe41483b3417204bd9b9d66ffba7d49619db02920b794bd92e2006cd9be12f9f777e89efeb051b727e14d896372b508c2358752feb4f704cc943c0f48a2cca254fe806c3b592a65", 0x67, 0xfffffffffffffffb) r1 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000005c0)={{0x2, 0x0, @descriptor="907c7ad3d11a7326"}, 0x39, r1, [], "197d8604a8b3bebbcf73a05ed5cdfc58d8da0460e0e7cda52c6f49d4b6fae44fde1458c34a20581e39026c794208aa7bb74e5ba25d056228fe"}) keyctl$get_persistent(0x16, r0, r1) 06:02:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstatfs(r0, &(0x7f0000000080)=""/150) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x11, 0x800000003, 0x8) finit_module(r3, &(0x7f0000000180)='bbr\x00', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f0000000240)=0x10001, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="011b0010", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r5}, &(0x7f0000000180)=0x8) syz_mount_image$iso9660(&(0x7f0000000340)='iso9660\x00', &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000001480)=[{&(0x7f00000003c0)="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", 0x1000, 0x10001}, {&(0x7f00000013c0)="a5a2e7b5f75125d8ffd744ac0eef8735ba916f8fc534e6b3b658aa70d331a58095725d25c58b540a250937f977b8855a9990769308ec3bb84910a1e3d36f9574973108b4033d77fdc26551b03e0cef033c82645b14eac31eabb36bac3b21e38b5a744e4fdde0", 0x66, 0xce67}, {&(0x7f0000001440)="f8ff7dc6d4a117a9d9aa85e380cb0964ad0c552bb46ed4fd33359d", 0x1b, 0x100}], 0x40000, &(0x7f0000001500)={[{@check_relaxed='check=relaxed'}], [{@subj_type={'subj_type', 0x3d, 'bbr\x00'}}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x3f, 0x800, 0x4, 0x58a, 0x8000, 0x46, 0x200, 0x1bc32cad, r6}, 0x20) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 440.223658] FAULT_INJECTION: forcing a failure. [ 440.223658] name failslab, interval 1, probability 0, space 0, times 0 [ 440.251660] buffer_io_error: 39 callbacks suppressed [ 440.251664] Buffer I/O error on dev loop5, logical block 0, async page read [ 440.264159] Buffer I/O error on dev loop5, logical block 0, async page read 06:02:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf9, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) modify_ldt$write(0x1, &(0x7f00000000c0)={0x3, 0x20001000, 0x4000, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2001, 0x0) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x2e90, 0x7, 0xa, 0x301, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFTA_RULE_EXPRESSIONS={0x295c, 0x4, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@rt={{0x7, 0x1, 'rt\x00'}, @void}]}, {0x10, 0x1, 0x0, 0x1, [@hash={{0x9, 0x1, 'hash\x00'}, @void}]}, {0x140, 0x1, 0x0, 0x1, [@numgen={{0xb, 0x1, 'numgen\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0xffffffff}, @NFTA_NG_TYPE={0x8}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x10}, @NFTA_NG_DREG={0x8}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0xfffffffb}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x1f}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x2}]}}, @immediate={{0xe, 0x1, 'immediate\x00'}, @void}, @payload={{0xc, 0x1, 'payload\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_BASE={0x8}, @NFTA_PAYLOAD_CSUM_OFFSET={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x10}, @NFTA_PAYLOAD_OFFSET={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @payload={{0xc, 0x1, 'payload\x00'}, @void}, @notrack={{0xc, 0x1, 'notrack\x00'}, @void}, @bitwise={{0xc, 0x1, 'bitwise\x00'}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x289a7192}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x1ff}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x215893fff49200c2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0xb}]}}, @log={{0x8, 0x1, 'log\x00'}, @void}, @dynset={{0xb, 0x1, 'dynset\x00'}, @void}, @rt={{0x7, 0x1, 'rt\x00'}, @void}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @void}]}, {0x7c, 0x1, 0x0, 0x1, [@log={{0x8, 0x1, 'log\x00'}, @val={0x4}}, @counter={{0xc, 0x1, 'counter\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x22f}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x2}]}}, @immediate={{0xe, 0x1, 'immediate\x00'}, @void}, @socket={{0xb, 0x1, 'socket\x00'}, @void}, @byteorder={{0xe, 0x1, 'byteorder\x00'}, @void}]}, {0xc8, 0x1, 0x0, 0x1, [@socket={{0xb, 0x1, 'socket\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_DREG={0x8}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x13}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x1f}]}}, @connlimit={{0xe, 0x1, 'connlimit\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xf64}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x10000}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x12000}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xeb}]}}, @meta={{0x9, 0x1, 'meta\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0xa}]}}]}, {0x6c, 0x1, 0x0, 0x1, [@counter={{0xc, 0x1, 'counter\x00'}, @void}, @dup_ipv4={{0x8, 0x1, 'dup\x00'}, @void}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_MODE={0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}]}}, @numgen={{0xb, 0x1, 'numgen\x00'}, @void}]}, {0x44, 0x1, 0x0, 0x1, [@masq={{0x9, 0x1, 'masq\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x5}]}}]}, {0x2564, 0x1, 0x0, 0x1, [@dynset={{0xb, 0x1, 'dynset\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_DYNSET_FLAGS={0x8, 0x9, 0x1, 0x0, 0x63b765f32b68198c}, @NFTA_DYNSET_SREG_KEY={0x8, 0x4, 0x1, 0x0, 0xe}, @NFTA_DYNSET_SREG_KEY={0x8, 0x4, 0x1, 0x0, 0x9b5684d80db59156}]}}, @numgen={{0xb, 0x1, 'numgen\x00'}, @void}, @immediate={{0xe, 0x1, 'immediate\x00'}, @val={0x234, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_IMMEDIATE_DATA={0xb8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb2, 0x1, "657e677eef753d12d8ffe393c0c8537e31d61d760fa570182f7c500ea1bb8ef83455e6ebbb88309fd382c3540eca837489e5f1ff501d789d5baac36a866ed815e1416fd4b9984945baaf3abed61ba6f48fac0c4bce89a90e6b9c8f4b082516c8c1f84f3c7de61b0c991daec04c475ddce70f0dcb13c8eb6ee1dac92f1aa221c612734ef734be7fc586f0667a66803526d88cf3292be50153342776e094cd7474a3150eaba3b9ee53983fcff649f8"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_IMMEDIATE_DATA={0x168, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xf8, 0x1, "0eda690891d973b026dec33094765d1f33a52f12a280dc719fc7db257217376dd9e5a6239e45338d2a79216bb431ae235ba2a003f8c9bd7572ac2bde738a54d612d405f8d03c23113af93112ca7e0f2a3065f2b470746ec6e83ded379a6705259c22dd98181643a7e1ac4d14950a7187bd2e8e02fc1c7a9aaa78aa920fcbadc884cde4692cd35722dfd3b34c3fb8c1970353af30956be4167547e4321464e89bc5a19bdf4edc0f89c3ee7dd726832673d1cd96649d06ca361c543e658c1a9511e6ac52a6ae49badb9a521a864d72f16491d42f6eaf304be213d0039e40b223ef12cfafafc5c8002dddba4413dc86ed5f24f202a7"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}]}}, @immediate={{0xe, 0x1, 'immediate\x00'}, @val={0x22d8, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x1008, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_IMMEDIATE_DATA={0x80, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x7c, 0x1, "3389230b143a12b158b624b64da90b346a139a646f0cb01b3716cf98a8d844c7f25d458be6d8173e632ffc972798a54e5a89ec7bce0a28c381989bad309d2b7d1a58102de2db32a305afeab98e6b3042c010c17a08ec67efa6bc2f18931e0539efd270836185a86ec159fcbf7eb198aad039ad98070ce90c"}]}, @NFTA_IMMEDIATE_DATA={0x178, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xc0, 0x1, "1814538d5bcedb923d0356dd355d0d5ffce9a7b8a87d4a3e35bfe0ff18ba2a6afa66294ad50fddbf59eb914bd7a3d387b17016bdeabdd343c41962815410cafa2a21cc1ec39c042dcf7000099f04209c6c6d353ffaf5f59149c2084c28c39363c267baa513b54d22ff838f878d7cac98b2c5e95bcff076d8719416859d84765c9ca766c61da15c3d210d42a13719ce60c204cde2bdbc77379b16e0948bed1db0aa01d61d2e6596c3805652a33a8b2c3a9dee8973ec2779cf14d7f498"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x2}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_IMMEDIATE_DATA={0x10cc, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x97, 0x1, "60726e1265a9aa9aa1ba22cc05b2f6364f1775804be783a42198e4d369e8b37bc9316a45951ab623ed1fade51701d62a2788ab949047406e0d0df363bd1e12863322346041397ad1d532af09c8f1d9d546d1599c0e5196867f300f0a6767f6538e879f7e03c3303ae0a02e21c98b257f31cc5f26db2bc36a2ee164e2e199c5177255c60b84ba64a35879e341f5348f427b6bd1"}, @NFTA_DATA_VALUE={0x1004, 0x1, "14cd782c9cd09a6ce2b9f13f81c9dcc35155bb213eb83d6c4092696b1355b2d8afe39c2fe395e5b0def2529bb744477c390c0ccc820423b039cbe819712797d8911f62025c68688bdecd63841825f36e9b18d8139c7b9f80f8d03d53af27f933a3a558f3d69919c63cf55aec2bc938fd4c0012274fa039f989bd4422436903853205f970d83aa7a665d5603e1f2a48be831a39e333e3de9c954f2de299478594ee294de9379e43975cc7a58986d98931165a1b275181d5ededc748158e5c7a5465b93d86748a8c9b2f2c288d8429071b96b5ac8eddc493fbf44ebd205f0051482342663b97ebe883ffaf1de353625f810e75f0d0fe4a6f184972f5711a7de5faaa1c1ecd216f2d3005dfbdeb0103b7ecf6ac9cc6a7e690468d9ff03ca14a2ca7b51e49b908ca3643092f415fcb19749522f5d031a92a6e9163527ed563de1a240e44860da3cd2e3464fe8483410c4cbe938fa39f7dc31133aaadcaccdb330887d1c09712a06f1161b0b54c8bfa9dc9ebc2653849d9ba068710a3ed354a2ea96a246ec60d1493303310eca1ef1a8ee86d651238fd7b166a24b4da6864c4f053ccf0b517f86a9f88227e1b22c29eca944db784f1870615328049cba9308cc4458a2a837e5267e5e2475c002cf2bf28fd347732bff07cabd9a311af780f10294aa0ff691f9542598dc5653ae3d7d783ee71f5085a6712c112702f933f6523c1706c7472330ee3847d924da9b32eecec5317aab4e40fa6f7b5fe89a2ed0e828783e7fb001304bdfb7417e50ca2b36cdb2bcdd6d6e7d4de88fc03a3300b6d22354755fa05d669f7c09cc3586fd6393a073694085039bb9ce5499a052886b825550e608b0cbc4070182ff3ec9cec4c96b8f65adc8ce2d5cadddc52f31a2060e1ac7578cf5e951cdfbe6ae47a623ea57a91abe276303a491237446afff9051317b1667a8cc8159466e4a249f1175f808ab75eeee5c9c9b373091f80f3bb6fd1e997fe37f21077c7211fdc6f76a4b8d4f9c4c2918a3caacef2a0de6b05a0236f5cc3ad303971a2982a24513f7871ee973a59e7cdba384d527821f52314931c7d1e5c17dc9a42f2920555596e38d51dc63eadf286c690998590b8726b5995be428b6740b8d1e73a59993292e52bb22f723889a2199da88ff1c951f66965a32c01b4be244e0f3c127fc0c60cfcb2c0135ecf82b656cbead6d4b467d9e5354de1f1b61f01e1b0261d5a2bc9164e79c31387bbdc42040c28d26326005ebd93ddd98d97c260ab782646eb9f0121e6813579eb795542986d9f903e464d50ce36f938a28394b6b926fd3dde16406ca869837c461f636ffa093067935777174df7bce43bb3933e2faf7cdb6923846ad0353f46696fb383c09d2b59508227a7ec1263d90202a22ee7ff504abf6223d4ef57a6903dfe44301342726f1eae95480519e1d6b2888d25d883d230b8f20044743f3755ba47b2aacf618ccaf8a738d6a33ae105a98b83371d0945e2016a7200ce6c86887e6b889bb8ea90d7b70473d6a495a4c2409b822aa283bc3dd24a56165ca3497a0385a2301a576aa32441d2373c90f22537203fee2ac8fef8b95932f9268fe97bcdde0936ab959535c351e0c8a0f066d1950f3ec43d05202d905e9b1844c935914569c38f368260fb25749c04c4168da29c20c0ab3d9e440888ffe310a83d0d3272a9b929be0960b8dac35fda71d0ef3ca29c2dc3fb06c570d7ab876b03eae3097bf3aaed1bbc9251a64700d65eea569f2816e52b521f3247390fed0c214f51085394ad84a4173a9a5cf7a78dd3e85dbaa7ef65bebddb5706d50251df3a1d79616169e67c0aa14c86a4c11181372fae093f5145ea9ddfd854ec1783a74c47f3b6fe6e4d15c25ab413d5a149dd056e8ff6e44118b8d5298d2802db56b24e16833cfc998250e5dbd00fb6f4407a2bf0bfc698609c7fca5d49fca97a9a416f11adb863e512c6b5bb62848971cc9d53bc4d2c06351ec20793d0efcff6e4c6f45220d90a1fb15861e69511f6e255057ee7f63745048d129f7294dfbbec8198b7842aeb721ed71776277419bdf0d8c946f51effe991aa9bd9e526bae3a4d9ad5434e476f87ede32d024d92997d80945fee1c370a13e54566641037df1a768e658936341197d587e99f1af708e865fbb421b87f38ce84a67aba25518b09d634ff65764a4d90a5f60c8ed43ea5e4d1a9ed6f702b415f4a8162c867cb5aa282ce1b777761778f2d50587c83929d613be6fbaaf20f6b8a09d351413a47476f8763835acfeccf428712cfb4898abd798245ccc30ec35c48abf5ad3b70c8801b738b4b96246790d4b0b6be0572741a3e1503e7b51175743e71d2fd0fa9d63eefc719b0ad944cb978fd1d7ac986b88f342cc885b981460748c4a54db1d24685c4df9b2a9c761fabce834a7690a16b9218d23bd28a9a9610bb20d02df75202d72efeaff583071ecddf3c856316f1aea0cc46d799ebb067a8637431c38f0516a8733f04e0e347208da64ce8ad8c73c28f28dac2cfde5360062da29951cddfa3870729708f8504df99d461109710b5a30dc0f78d520e594064007cd5a678d5d1b95e5b81e88ba017da8c0e1c3d3bed722fdaaff8bcc0d169f2d5e1e2725b9107238c31fdfbf0cb8738a6625424d4fad016b1d864a219266a6bc5ae72e08524e6dae28775f7945914e9fab07c9fb1f3eb04a123970e4676b85cb5336a84bb9ab135827899c856f0715c590fcdf89850e720537d9760999cf280db047a7003ac06e634af51b9fdfd411faf6dc2f2fac2cda5c9cc824a2688dfa5a5967ff05b206bf33bbce92cfd6610d471e78c2bd42f9a99e3f8d3dbba65c7821fcb5d0ea025eeae1f18b61ccbf94109a388fa402ce02484cdd386e36046bb70d67766dfd6da7f814732564b027d1a81f39f1a0bd91f6b728483cddfd164f378b48e1eaee98c63ed4b5bdcc09055c8c851f3a9d7f41b6f4f39f2ab7ff4b2aa2bcfc164805d63cc9ca6591581e304e2f1c86dcb719d52a9ff9977e62fa4600455bd5cdd1e4a2685d9ecf6c7ca185363fb01bbaaf1c4b3dacbbc8c64e577cfaa74247c1335078d5e8d977f4f0e75b7fe477a159bd7184e281271696444ca665bfb663c611f22ef9846b7b700f220866c4517edc42ef98e6970688a6c14b8c14989bb951b0e63b352e9295518187e8e29b4666c548562cf4a9a183f94ae4e62da4f5654e49bd5ba5e8a50fda97170072f307f3d36268558a522dae79e6f9e020089de48c6bc226365f96468fe13597fe289f420fdf771326c88537304e0d5a89dd5a2c3cd015ddbe69a71347940d6f032d2a549e135a0982d203412f5c881080e2c3c83b728ed1ab3e27e4ee39eb715404068a87ef0f42fe2e5677928e3e5530b10a461bf995130d9b1190a077b348409d8b6dde3fdc3fd2446d17a48d62358c77477e76223d7967d39274e64f0858faa267240a95f2289bd293d902c1fdfefaac4295c87e7782f71a4547f655500519ef26dba513609f2f65a2f1c591a188ae221e39ade5953d0694bf7ee72007dddab343a3834dcf25eb8040cb0535e9f36eaeee7c0e100101404cd02a207fbaebfbf335f144d7cecbceaa1f7f86e431e6297fa44f9ad39c28c4ed9c22c919c6cef21aff7914bb18ef0193fb5f6b324ac3925982074114927ed25a8354ca00246f68d1fbd3eefa120f875da93450033b6ae72529df248915b8f464c38ea3fb1b1c211a1b536d3d40911af81c6052243e5728616c7df8845cb63a13a27cdc43b610fd4febfbe6d98a8cca36e34e6d9d8e037fcce56d58cdd7a37ea7f92ae3ae93bfc21296811cf563f46d5b73bc2be69a33fab69e7e6c106c2ff16638243121f14c2d17321f4de153a221f0b2c4aaf19c504a75c5f4ac89b6c8fdce340f6e6717d8c85f3dd9e8c931d3e9c25d86cc3f9c01851cfb05d7d3c5a50dc4f735bcec9168d7e54f483a8095e3836763676e6d251fabb156fb033706c7503926908ea9ec97ab7bfe8092896c82c0ca7642e415a5da668dd4502afaf64d1d93284de0f21b2c5fd8bf474f9841862773de7d9eaee652135d36491cab55b8f72d6d83cc6704ad5eef18fd428cdf9f0a21123d759cdc3c25beffa7bf2f6477f0b13fab4188bc3c80c8a47c5d7097837ebf4ad3cbe99e40ed587b27ccfcb649f672492be27b0d9130aa208480b2d75a7581e929876bbe13a285dbd2f3aac70f32953f61f61757ee380140256d7c526b5d47ddcab3707622fe385d4e18e3f4613d3380523b5d3adcedd6e2a43389c9890d6ae5d99cd09da44f0fddb4fc264398a77b3644d5d59796a3ed40069bcafc6077a19dfaf7b9ea8b151a7b18c6b2028cfec9af5abdbf723f0fd18dfb0f64d7362df22bec2130319bbacab4ac6528c6731780485e62ebf27f8eaa31589df920e2cd5e5f2e83cae589db4e55ce57519a81d3f89efefd5899e145494f7a21ea77236317acf367fd4e2e2d023eb2d1deb5a38da644db563b6ace5724381363d71e650aec10aade8b4c4e9602cfe591efee69dd021315d3f0580611e82b6a21df0b3da69fa69a2f1ee5f4b65a8a440d956acbbe39108c24a388df2ebdd9480f343be1084ef59285346e7f50a57e38a9ca328c7e00c4b90d6a807471e9334327a36fbf972181eef0ca61baa8d3433a710a2c47300695c9872f905fb6e691f9a9601ab0f31a38612a7008924d426bac1607f9edc6afc5cf1ce80618a2473ac9f91955247db18d594c590fbdb5d4c53985c52dd404610199533909fafaf8a49d7596fbb0367407159dffec789b89b0082c629f2da7c5941b1b1433bd6f2b968f4eed351de936600d6b237844939c4552b227b2c75d89a73b9c5495faa92b83d13b3e60766d03e928f1fb16d15c2b74620e59253cf93339f19cf9b8ac2756491f7ed37616ddbb80b2c4b9426c64473147167797036a1322720233cb43e4cf58ccd1ec3474edd076862900dfad9e2d64987874ab2c9247fa361b4171ef48f521dca8414db14cc9d38fa3abaa6dcced11ff40deec6532e14d6469fd5c9264c957c3ed4965a2c91a2f1c35464332e591b884a471704d46337c2e79815f41938d68d92868735735a47a7940920a0450ff9653acee7a9358fd03c9b78636fd939878f8c24f4e3a3eea3b9e6af1dd590ad8aca0c3b82fa22c6cb9dcea34968f65db904bd228c316ce45c08bd5069f48d8eb435d42517a33e799911dccde628716209854b7895ddfba8876c96cceef50c45dd7e8f902b277f6b6624c14e47aa57c8d84125c2e3cf29a5862bcbb828394fa7d24a1701855490e7bba7d0b5e9b88b5b4c252318d9bfa1a170789705162f945238129aa8790c21b31accdc294ce36d1d641c77096d9b618a2f1d8c2679007f118dbb3cb96aa2bb360dea67ffcb2bb55f75833de4c1c9205d87b7c824ff213edef0d6559571523dbdaa654bfbd2671f0bedac8b8e052789b3bc50163e801afe612c512a35bf5f157f95e87e3c0067ced8443bef61bae12b4d9ebf4941840dfd1d6d3ea03ef967e40d4b4c2cefa50943f9bd15601dd6922bd65cee44cf3c6e3d2d188a653cc158ac69415dc73db1f429012b43d779775f7e475f2dd77dc9b185cdb5a1e19e45e6241bc21ca0275c9ea4868fa4d7ff5b3e8ecfdccff4b005c162f2d96b075fb5ce3b82e737dd1ee40f2bf910c738fa6353e806e8826a084a32e25fb07757ae455f984c253a4de064b0b24c8f4bd670bfdfdc6045a9dc9d9662b624638502195d3d2e952938ed27b13b85d3b37598642ac87e73313a25fc1681603873e6eaa764f"}]}]}}]}, {0xa4, 0x1, 0x0, 0x1, [@nat={{0x8, 0x1, 'nat\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_PROTO_MAX={0x8, 0x6, 0x1, 0x0, 0xd}, @NFTA_NAT_FLAGS={0x8, 0x7, 0x1, 0x0, 0x21}, @NFTA_NAT_REG_ADDR_MAX={0x8, 0x4, 0x1, 0x0, 0x9}, @NFTA_NAT_REG_PROTO_MAX={0x8, 0x6, 0x1, 0x0, 0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8, 0x3, 0x1, 0x0, 0xe}]}}, @fwd={{0x8, 0x1, 'fwd\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_DEV={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_FWD_SREG_ADDR={0x8, 0x2, 0x1, 0x0, 0x10}, @NFTA_FWD_NFPROTO={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_FWD_NFPROTO={0x8}, @NFTA_FWD_SREG_DEV={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_FWD_NFPROTO={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_FWD_SREG_ADDR={0x8}]}}, @lookup={{0xb, 0x1, 'lookup\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_FLAGS={0x8}]}}]}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_USERDATA={0xc8, 0x7, 0x1, 0x0, "09d91dd8118c5504030cb94fbd4fbefed8c31082fa8bbf72cd561068fcb1eebf1983f4b428506e82447ee3b8e658957e5e886d2b4b0f4f11550f0e3582dda871db8bbb03a1b11f01fa4a1ecac6da70fc46706a9fadb1bcce1247d9fa636e6667e250e734a120236424d53d9ae01cc7e9161a2488b26f3548d3dbc96280bbba04fe1cc0a299d007fee54984cac23262d0b97486b96f7ec1a4e5039894b68ef318488c6c3a3fc5b0a72f821df500c0d9551aeac6ec1b3af72f675b1b6c374c4d0d04b87a44"}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x42c, 0x4, 0x0, 0x1, [{0xa0, 0x1, 0x0, 0x1, [@dynset={{0xb, 0x1, 'dynset\x00'}, @val={0x28, 0x2, 0x0, 0x1, [@NFTA_DYNSET_SREG_KEY={0x8, 0x4, 0x1, 0x0, 0xb}, @NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_DYNSET_SET_ID={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_DYNSET_SET_NAME={0x9, 0x1, 'syz2\x00'}]}}, @dynset={{0xb, 0x1, 'dynset\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_DYNSET_SREG_DATA={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_DYNSET_SET_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_DYNSET_SET_NAME={0x9, 0x1, 'syz1\x00'}]}}, @lookup={{0xb, 0x1, 'lookup\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x14}]}}]}, {0x1c, 0x1, 0x0, 0x1, [@lookup={{0xb, 0x1, 'lookup\x00'}, @void}, @objref={{0xb, 0x1, 'objref\x00'}, @void}]}, {0xf4, 0x1, 0x0, 0x1, [@ct={{0x7, 0x1, 'ct\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0xa}]}}, @range={{0xa, 0x1, 'range\x00'}, @void}, @counter={{0xc, 0x1, 'counter\x00'}, @void}, @exthdr={{0xb, 0x1, 'exthdr\x00'}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_SREG={0x8, 0x7, 0x1, 0x0, 0x15}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x86}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x22}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xcd}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x2}, @NFTA_EXTHDR_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xa7}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0x7b}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x83}]}}, @immediate={{0xe, 0x1, 'immediate\x00'}, @void}, @exthdr={{0xb, 0x1, 'exthdr\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0x63}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x53}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x89}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0xf8}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x2}, @NFTA_EXTHDR_SREG={0x8, 0x7, 0x1, 0x0, 0xf}, @NFTA_EXTHDR_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}}, @queue={{0xa, 0x1, 'queue\x00'}, @void}]}, {0x3c, 0x1, 0x0, 0x1, [@lookup={{0xb, 0x1, 'lookup\x00'}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_DREG={0x8}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}, @counter={{0xc, 0x1, 'counter\x00'}, @void}]}, {0x8c, 0x1, 0x0, 0x1, [@objref={{0xb, 0x1, 'objref\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_OBJREF_IMM_TYPE={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x17}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x3}]}}, @dynset={{0xb, 0x1, 'dynset\x00'}, @void}, @lookup={{0xb, 0x1, 'lookup\x00'}, @void}, @range={{0xa, 0x1, 'range\x00'}, @void}, @dynset={{0xb, 0x1, 'dynset\x00'}, @void}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @void}]}, {0x100, 0x1, 0x0, 0x1, [@exthdr={{0xb, 0x1, 'exthdr\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0xb2}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x19}]}}, @payload={{0xc, 0x1, 'payload\x00'}, @void}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x19}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_MODE={0x8}]}}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_TTL={0x5, 0x2, 0x1f}, @NFTA_OSF_DREG={0x8}, @NFTA_OSF_TTL={0x5, 0x2, 0x1}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_OSF_FLAGS={0x8}]}}, @dup_ipv4={{0x8, 0x1, 'dup\x00'}, @void}, @quota={{0xa, 0x1, 'quota\x00'}, @void}]}, {0xb0, 0x1, 0x0, 0x1, [@xfrm={{0x9, 0x1, 'xfrm\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_XFRM_DIR={0x5, 0x3, 0x2}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0x13}, @NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_XFRM_DREG={0x8}, @NFTA_XFRM_SPNUM={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_XFRM_DIR={0x5, 0x3, 0x1}]}}, @dup={{0x8, 0x1, 'dup\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x16}]}}, @meta={{0x9, 0x1, 'meta\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x10}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xb}]}}]}]}]}, 0x2e90}, 0x1, 0x0, 0x0, 0x4000800}, 0x10) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @default, @bpq0='bpq0\x00', 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) [ 440.271553] Buffer I/O error on dev loop5, logical block 0, async page read [ 440.280036] Buffer I/O error on dev loop5, logical block 0, async page read [ 440.287303] Buffer I/O error on dev loop5, logical block 0, async page read [ 440.295235] Buffer I/O error on dev loop5, logical block 0, async page read [ 440.296474] CPU: 1 PID: 8258 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 440.302631] Buffer I/O error on dev loop5, logical block 3, async page read [ 440.310115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.310119] Call Trace: [ 440.310135] dump_stack+0x1b2/0x283 [ 440.310149] should_fail.cold+0x10a/0x154 [ 440.310162] should_failslab+0xd6/0x130 [ 440.340770] kmem_cache_alloc_node_trace+0x25a/0x400 [ 440.345852] __kmalloc_node_track_caller+0x38/0x70 [ 440.350758] __kmalloc_reserve.isra.0+0x35/0xd0 [ 440.355416] __alloc_skb+0xca/0x4c0 [ 440.359016] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 440.363833] ? netlink_has_listeners+0x1ff/0x310 [ 440.368564] kobject_uevent_env+0x6d1/0xc50 [ 440.372873] lo_ioctl+0x1177/0x1c00 [ 440.376474] ? loop_clr_fd+0xac0/0xac0 [ 440.380337] blkdev_ioctl+0x91d/0x17c0 [ 440.384207] ? blkpg_ioctl+0x8d0/0x8d0 [ 440.388069] ? trace_hardirqs_on+0x10/0x10 [ 440.392285] block_ioctl+0xd9/0x120 [ 440.395883] ? blkdev_fallocate+0x3a0/0x3a0 [ 440.400178] do_vfs_ioctl+0x75a/0xfe0 [ 440.403952] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 440.409548] ? ioctl_preallocate+0x1a0/0x1a0 [ 440.413932] ? security_file_ioctl+0x76/0xb0 [ 440.418313] ? security_file_ioctl+0x83/0xb0 [ 440.422695] SyS_ioctl+0x7f/0xb0 [ 440.426034] ? do_vfs_ioctl+0xfe0/0xfe0 [ 440.429985] do_syscall_64+0x1d5/0x640 [ 440.433850] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 440.439009] RIP: 0033:0x45c9f7 [ 440.442170] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.449848] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 440.457111] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 440.464353] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 06:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000200)=0x8000) [ 440.471681] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 440.478921] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000640)={0x0, 0xca, "c9b19b4a8d1fbd4f6c0e86803997107e08ebb409df08eadabac4e2107cae73515b4dae287ceb95464d336ac145052c8eddd93b7f8860ca08e79de3ebd34ea2a4f723f067e6e381556a9351abf3c57b762ce3cacfaa9286bfe5f3193dbe0b0055dfdc151502d0b988292f3516f9b68908f2a3674b3f77da2112a0b928dbc394b9711b51aa6a381aba296b5790896d8299ee117a6e83ca2c7331ffa80fbfd896b9d6654c57276739368900ec6d67be7495e9a71e03db86879a22117ba7598a629fd0c5e380484fde1c59df"}, &(0x7f0000000240)=0xd2) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000280)={r3, 0x2, 0x8}, 0x8) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r4, 0x80006) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000480)=""/181) [ 440.542182] BTRFS error (device loop4): superblock checksum mismatch 06:02:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000100)={0xc, 0x8000, {0x51, 0x6, 0x0, {0x1, 0x81}, {0x2, 0xd29}, @period={0x5d, 0x1ff, 0x3, 0x2a9, 0xa20, {0x3, 0x80, 0x101, 0xfff}, 0x9, &(0x7f0000000080)=[0x65, 0xffff, 0x8, 0x40, 0x4, 0x2, 0xa7db, 0x5, 0x7]}}, {0x51, 0x1, 0x0, {0x8, 0x3}, {0x7, 0x80}, @period={0xba, 0x5, 0x0, 0x2, 0x69b, {0x4d59, 0x4, 0x80}, 0x8, &(0x7f00000000c0)=[0x4, 0x6, 0x7f, 0x6, 0x9, 0x6c, 0x6, 0x100]}}}) [ 440.608381] BTRFS error (device loop4): open_ctree failed [ 440.626051] BTRFS error (device loop5): superblock checksum mismatch [ 440.672126] BTRFS error (device loop5): open_ctree failed [ 440.681894] BTRFS error (device loop4): superblock checksum mismatch 06:02:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r2, r3/1000+10000}}, 0x100) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r4, r5, 0x0, 0xff7ffffe) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000140)) 06:02:37 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 440.738347] BTRFS error (device loop4): open_ctree failed 06:02:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 06:02:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendto$isdn(r0, &(0x7f0000000080)={0x6, 0x6, "c5154d8d5b96a3680f1e49409e31458678a5237d578061bbe7e8f40374064052ed6152c39b261cadad716151e689e7233b0e6077c420a32fa9c83fa8b26ca6ec89dd1d030c1aabfccc089a5981e894d172089ba64c1d556698ca51a6d6e87195f4cda505be0632e84c51250a36b035ff4e4c934a97cdb0bc13ba8caf886a0f3d2be29ce49f53c57c74bbde4a9de2246e684e42698895"}, 0x9e, 0x2200c055, &(0x7f0000000140)={0x22, 0x7f, 0x4, 0x4, 0x6}, 0x6) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x6, 0x40001) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000340)=0x4) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000380)) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 06:02:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0xfffffffffffffff8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 440.815087] FAULT_INJECTION: forcing a failure. [ 440.815087] name failslab, interval 1, probability 0, space 0, times 0 [ 440.847970] CPU: 1 PID: 8306 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 440.855901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.865395] Call Trace: [ 440.867977] dump_stack+0x1b2/0x283 [ 440.871597] should_fail.cold+0x10a/0x154 [ 440.875729] should_failslab+0xd6/0x130 [ 440.879680] kmem_cache_alloc_node+0x25f/0x400 [ 440.884244] __alloc_skb+0x9a/0x4c0 [ 440.887847] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 440.892665] ? netlink_has_listeners+0x1ff/0x310 [ 440.897398] kobject_uevent_env+0x6d1/0xc50 [ 440.901713] lo_ioctl+0x1177/0x1c00 [ 440.905322] ? loop_clr_fd+0xac0/0xac0 [ 440.909184] blkdev_ioctl+0x91d/0x17c0 [ 440.913045] ? blkpg_ioctl+0x8d0/0x8d0 [ 440.916907] ? trace_hardirqs_on+0x10/0x10 [ 440.921125] block_ioctl+0xd9/0x120 [ 440.924729] ? blkdev_fallocate+0x3a0/0x3a0 [ 440.929027] do_vfs_ioctl+0x75a/0xfe0 [ 440.932811] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 440.938418] ? ioctl_preallocate+0x1a0/0x1a0 [ 440.942805] ? security_file_ioctl+0x76/0xb0 [ 440.947191] ? security_file_ioctl+0x83/0xb0 [ 440.951588] SyS_ioctl+0x7f/0xb0 [ 440.954939] ? do_vfs_ioctl+0xfe0/0xfe0 [ 440.958898] do_syscall_64+0x1d5/0x640 [ 440.962761] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 440.967928] RIP: 0033:0x45c9f7 [ 440.971094] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.978819] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 440.986061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 440.993307] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 441.000561] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 441.007810] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x200, 0x0) getsockopt$inet6_int(r2, 0x29, 0x1, &(0x7f0000000500), &(0x7f0000000540)=0x4) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e22, 0x0, @loopback, 0x9}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00', 0x1}, 0xffffffffffffffc5) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0xff7ffffe) ioctl$DRM_IOCTL_MODE_DIRTYFB(0xffffffffffffffff, 0xc01864b1, &(0x7f0000000140)={0x9, 0x1, 0xdb6, 0x8, &(0x7f0000000100)=[{0x7, 0x761f, 0x5, 0x2}, {0x9, 0x1, 0xa174, 0x6}, {0x2, 0x3f, 0x7b, 0x100}, {0x8001, 0x4, 0x7, 0x3}, {0x5f, 0x2, 0xaa0, 0x8}, {0x81, 0x7, 0x8, 0xa40a}, {0x65f, 0x20, 0x8000, 0x10}, {0x1de, 0x8, 0x3, 0x2}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000080)={0x4, 0x1, 0x934, 0xb4d2, 0x9, 0x37}) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000280)=0x1) sendfile(r0, r3, 0x0, 0xff7ffffe) ioctl$RTC_PIE_OFF(r3, 0x7006) [ 441.029182] print_req_error: 36 callbacks suppressed [ 441.029188] print_req_error: I/O error, dev loop4, sector 128 [ 441.045286] BTRFS error (device loop5): superblock checksum mismatch [ 441.099432] BTRFS error (device loop5): open_ctree failed [ 441.100331] print_req_error: I/O error, dev loop4, sector 0 06:02:37 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 441.199311] print_req_error: I/O error, dev loop4, sector 128 [ 441.271957] FAULT_INJECTION: forcing a failure. [ 441.271957] name failslab, interval 1, probability 0, space 0, times 0 [ 441.283972] CPU: 0 PID: 8346 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 441.291761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.301094] Call Trace: [ 441.303678] dump_stack+0x1b2/0x283 [ 441.307302] should_fail.cold+0x10a/0x154 [ 441.311464] should_failslab+0xd6/0x130 [ 441.315447] kmem_cache_alloc_node+0x25f/0x400 [ 441.320008] __alloc_skb+0x9a/0x4c0 [ 441.323618] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 441.328457] ? netlink_has_listeners+0x1ff/0x310 [ 441.333211] kobject_uevent_env+0x6d1/0xc50 [ 441.337527] lo_ioctl+0x1177/0x1c00 [ 441.341141] ? loop_clr_fd+0xac0/0xac0 [ 441.345020] blkdev_ioctl+0x91d/0x17c0 [ 441.348885] ? blkpg_ioctl+0x8d0/0x8d0 [ 441.352760] ? trace_hardirqs_on+0x10/0x10 [ 441.356990] block_ioctl+0xd9/0x120 [ 441.360608] ? blkdev_fallocate+0x3a0/0x3a0 [ 441.364916] do_vfs_ioctl+0x75a/0xfe0 [ 441.368694] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 441.374296] ? ioctl_preallocate+0x1a0/0x1a0 [ 441.378693] ? security_file_ioctl+0x76/0xb0 [ 441.383083] ? security_file_ioctl+0x83/0xb0 [ 441.387482] SyS_ioctl+0x7f/0xb0 [ 441.390821] ? do_vfs_ioctl+0xfe0/0xfe0 [ 441.394772] do_syscall_64+0x1d5/0x640 [ 441.398638] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 441.403800] RIP: 0033:0x45c9f7 [ 441.406966] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.414648] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 06:02:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x400000004, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10000005f42485266535f4d00"/72, 0x48, 0x10000}], 0x0, 0x0) 06:02:38 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x14, r2, 0x536ae464467e3e0b, 0x0, 0x0, {0x21}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1ffb6faf", @ANYRES16=r2, @ANYBLOB="040028bd7000fddbdf250f000000080001007063690011000200303030303a30303a31302e300000000008000b00878500000600110005000000080001007063690011000200303030303a30303a31302e300000000008000b000500000006001100200000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b000104000006001100ff000000080001007063690011000200303030303a30303a31302e300000000008000b006ee000000600110001010000"], 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40044) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x20000, 0x0) 06:02:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @netrom}, [@netrom, @null, @remote, @default, @rose, @rose, @netrom, @default]}, &(0x7f0000000180)=0x48, 0x80000) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000200)=0x1, &(0x7f0000000240)=0x4) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 441.421937] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 441.429180] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 441.436438] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 441.443680] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 441.517486] BTRFS error (device loop5): superblock checksum mismatch [ 441.572108] BTRFS error (device loop5): open_ctree failed 06:02:38 executing program 4: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x440000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f80)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f80)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000fc0)={0x28, r4, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000fc0)={0x28, r4, 0x1, 0x0, 0x2, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc0610c3}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x401}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48050}, 0x20000000) 06:02:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, &(0x7f0000000040), 0x210040, 0x0) 06:02:38 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r2, r3, 0x0, 0xff7ffffe) write$ppp(r3, &(0x7f0000000100)="645f50c5565890ebf5cce838c27d1aee423104564aebb92281a250e6509ffb668d6b97efe438bc7b97c856c8947637f78a77bf280b8669fd4c5f57e013f69fb1553b7c5a4346c653eb37", 0x4a) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) finit_module(0xffffffffffffffff, &(0x7f0000000180)='bbr\x00', 0x1) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000500)=0x100, &(0x7f0000000540)=0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x5}, 0x182a3, 0x0, 0x1000000, 0x0, 0x5, 0xfffffffd}, r1, 0x3, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r3 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0xc725, 0x428040) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f00000004c0)={0x0, 0x9f9, 0x5, [], &(0x7f0000000480)=0x80}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f80)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="280079f6", @ANYRES16=r5, @ANYBLOB="0100000000000000000001000000000000000b000000000c001473797a3100000000"], 0x28}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r5, 0x8, 0x70bd2c, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x5, 0x200, 0x2, 0x80000001}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x850}, 0x8800) 06:02:38 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$binfmt_aout(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x8ee) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./bus\x00', 0xfffffffffffffffe, 0x0, &(0x7f00000000c0), 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x3, 0x4) 06:02:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000000c0)=""/142) bind$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) [ 441.776549] FAULT_INJECTION: forcing a failure. [ 441.776549] name failslab, interval 1, probability 0, space 0, times 0 [ 441.803549] CPU: 1 PID: 8385 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 441.811358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.820703] Call Trace: [ 441.823286] dump_stack+0x1b2/0x283 06:02:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r3, 0x8}, 0x8) 06:02:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 441.826936] should_fail.cold+0x10a/0x154 [ 441.831080] should_failslab+0xd6/0x130 [ 441.835046] kmem_cache_alloc_node+0x25f/0x400 [ 441.839613] __alloc_skb+0x9a/0x4c0 [ 441.843233] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 441.848074] ? netlink_has_listeners+0x1ff/0x310 [ 441.852831] kobject_uevent_env+0x6d1/0xc50 [ 441.857170] lo_ioctl+0x1177/0x1c00 [ 441.860813] ? loop_clr_fd+0xac0/0xac0 [ 441.864691] blkdev_ioctl+0x91d/0x17c0 [ 441.868563] ? blkpg_ioctl+0x8d0/0x8d0 [ 441.872448] ? trace_hardirqs_on+0x10/0x10 [ 441.876686] block_ioctl+0xd9/0x120 [ 441.880305] ? blkdev_fallocate+0x3a0/0x3a0 [ 441.884637] do_vfs_ioctl+0x75a/0xfe0 [ 441.888433] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 441.894049] ? ioctl_preallocate+0x1a0/0x1a0 [ 441.898462] ? security_file_ioctl+0x76/0xb0 [ 441.902863] ? security_file_ioctl+0x83/0xb0 [ 441.907265] SyS_ioctl+0x7f/0xb0 [ 441.910616] ? do_vfs_ioctl+0xfe0/0xfe0 [ 441.914569] do_syscall_64+0x1d5/0x640 [ 441.918458] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 441.923630] RIP: 0033:0x45c9f7 [ 441.926802] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.934492] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 441.941743] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 441.949002] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 441.956261] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 441.963515] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 442.018251] BTRFS error (device loop5): superblock checksum mismatch 06:02:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="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", 0x142, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r3, r4, 0x0, 0xff7ffffe) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r4, 0xc008551b, &(0x7f0000000140)=ANY=[@ANYRES16=r1]) r5 = socket(0x11, 0x800000003, 0x8) finit_module(r5, &(0x7f0000000180)='bbr\x00', 0x1) bind(r5, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) bind$nfc_llcp(r5, &(0x7f0000000080)={0x27, 0x1, 0x203, 0x5, 0x7, 0x1f, "bb05678e7df63b17e054b5d21fc79a8d43732fabf194ad2a0eca340ddc08625fa41fa2b72e85f1777e29bf8489da310fb7735f2b16dcbb455ba4b63f3205ff", 0x10}, 0x60) 06:02:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 442.069498] print_req_error: I/O error, dev loop2, sector 0 [ 442.079007] BTRFS error (device loop5): open_ctree failed 06:02:38 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x11, 0x800000003, 0x8) finit_module(r3, &(0x7f0000000180)='bbr\x00', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) accept4$inet6(r3, 0x0, &(0x7f0000000000), 0x800) r4 = fcntl$dupfd(r2, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xe, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af900000000004dd4b002000000001300007a0000000800ffd9f290293ea31e5ac93f051e0efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e24, 0x58, @empty}, 0x1c) r1 = socket(0x1f, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$alg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f00000023c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}, @op={0x18, 0x117, 0x3, 0x1}], 0xffffffffffffff38, 0x40040}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) recvfrom(r3, &(0x7f0000002440)=""/110, 0x6e, 0x0, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f000099e000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x8b}}, 0x10) sendfile(r3, 0xffffffffffffffff, 0x0, 0xff7ffffb) ioctl$SNDRV_PCM_IOCTL_DELAY(r2, 0x80084121, &(0x7f0000000080)) [ 442.205898] FAULT_INJECTION: forcing a failure. [ 442.205898] name failslab, interval 1, probability 0, space 0, times 0 [ 442.231597] print_req_error: I/O error, dev loop5, sector 0 [ 442.237503] print_req_error: I/O error, dev loop5, sector 0 [ 442.243498] Buffer I/O error on dev loop5, logical block 0, async page read [ 442.252393] print_req_error: I/O error, dev loop5, sector 0 [ 442.258191] Buffer I/O error on dev loop5, logical block 0, async page read [ 442.260243] CPU: 0 PID: 8426 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 442.265453] print_req_error: I/O error, dev loop5, sector 0 [ 442.273065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.273070] Call Trace: [ 442.273087] dump_stack+0x1b2/0x283 [ 442.273102] should_fail.cold+0x10a/0x154 [ 442.273116] should_failslab+0xd6/0x130 [ 442.273126] kmem_cache_alloc_node+0x25f/0x400 [ 442.273138] __alloc_skb+0x9a/0x4c0 [ 442.273148] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 442.273160] ? netlink_has_listeners+0x1ff/0x310 [ 442.273171] kobject_uevent_env+0x6d1/0xc50 [ 442.273190] lo_ioctl+0x1177/0x1c00 [ 442.273204] ? loop_clr_fd+0xac0/0xac0 [ 442.273214] blkdev_ioctl+0x91d/0x17c0 [ 442.273223] ? blkpg_ioctl+0x8d0/0x8d0 [ 442.273233] ? trace_hardirqs_on+0x10/0x10 [ 442.273254] block_ioctl+0xd9/0x120 [ 442.273262] ? blkdev_fallocate+0x3a0/0x3a0 [ 442.273272] do_vfs_ioctl+0x75a/0xfe0 [ 442.273284] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 442.273294] ? ioctl_preallocate+0x1a0/0x1a0 [ 442.273314] ? security_file_ioctl+0x76/0xb0 [ 442.273322] ? security_file_ioctl+0x83/0xb0 [ 442.273332] SyS_ioctl+0x7f/0xb0 [ 442.273339] ? do_vfs_ioctl+0xfe0/0xfe0 [ 442.273351] do_syscall_64+0x1d5/0x640 [ 442.273366] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 442.273373] RIP: 0033:0x45c9f7 [ 442.273378] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 442.273388] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 442.273393] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 442.273399] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 442.273404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 442.273409] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 442.439078] Buffer I/O error on dev loop5, logical block 0, async page read [ 442.452314] BTRFS: device fsid ffd9f290-293e-a31e-5ac9-3f051e0efd9a devid 0 transid 0 /dev/loop2 [ 442.462100] BTRFS error (device loop5): superblock checksum mismatch [ 442.529173] BTRFS error (device loop5): open_ctree failed 06:02:39 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @private1}, 0x1c) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r1, 0x40044104, &(0x7f0000000080)=0x8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:39 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 442.635597] FAULT_INJECTION: forcing a failure. [ 442.635597] name failslab, interval 1, probability 0, space 0, times 0 [ 442.681990] CPU: 1 PID: 8455 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 442.689800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.699142] Call Trace: [ 442.701718] dump_stack+0x1b2/0x283 [ 442.705326] should_fail.cold+0x10a/0x154 [ 442.709450] should_failslab+0xd6/0x130 [ 442.713399] kmem_cache_alloc_node+0x25f/0x400 [ 442.717957] __alloc_skb+0x9a/0x4c0 [ 442.721557] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 442.726379] ? netlink_has_listeners+0x1ff/0x310 [ 442.731114] kobject_uevent_env+0x6d1/0xc50 [ 442.735427] lo_ioctl+0x1177/0x1c00 [ 442.739156] ? loop_clr_fd+0xac0/0xac0 [ 442.743026] blkdev_ioctl+0x91d/0x17c0 [ 442.746892] ? blkpg_ioctl+0x8d0/0x8d0 [ 442.750761] ? trace_hardirqs_on+0x10/0x10 [ 442.754974] block_ioctl+0xd9/0x120 [ 442.758575] ? blkdev_fallocate+0x3a0/0x3a0 [ 442.762869] do_vfs_ioctl+0x75a/0xfe0 [ 442.766646] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 442.772243] ? ioctl_preallocate+0x1a0/0x1a0 [ 442.776631] ? security_file_ioctl+0x76/0xb0 [ 442.781014] ? security_file_ioctl+0x83/0xb0 [ 442.785398] SyS_ioctl+0x7f/0xb0 [ 442.788743] ? do_vfs_ioctl+0xfe0/0xfe0 [ 442.792705] do_syscall_64+0x1d5/0x640 [ 442.796581] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 442.801745] RIP: 0033:0x45c9f7 [ 442.804915] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 442.812609] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 442.819851] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 442.827094] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 442.834353] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 442.841594] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x1d, r6}, 0x10, &(0x7f0000000280)={&(0x7f0000000380)=@canfd={{0x2, 0x1}, 0x1f, 0x1, 0x0, 0x0, "f672f34531456492ceffdae5984ec1056992b620d2d56d0fe9aff06138d09dc9d56de535b0d4cd39979695c61841814feaafb539a97e25841a1be4f82be02285"}, 0x48}, 0x1, 0x0, 0x0, 0x4000084}, 0x10011) 06:02:39 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$nl_generic(0xa, 0x5, 0x84) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000340)=ANY=[@ANYRESDEC]}) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xd490010}, 0xc, &(0x7f0000000600)={&(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESOCT=r5, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4c051}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f00000006c0)={0x14, r5, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x8004) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r5, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x24008004) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 442.873362] BTRFS error (device loop5): superblock checksum mismatch [ 442.961171] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 442.970276] BTRFS error (device loop5): open_ctree failed 06:02:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') 06:02:39 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 443.028624] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 443.057005] print_req_error: I/O error, dev loop4, sector 0 06:02:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz0\x00', 'syz1\x00', 0x3d, 0x101, 0x5, 0x7ff, 0x5, 0x8, "96f67ee653a7172f2dc6cfa4260c115dfb077bab7670ac6647e26049297e89bf772ba39061177974a022ff4ddc5bc63bded9454d89603035cca2081b05"}}, 0x155) [ 443.075049] print_req_error: I/O error, dev loop4, sector 128 06:02:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x4) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000100)=@can={0x1d, r2}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000340)="a6de7127c4b840ff12e40dd8332213eaf920b5227ae39be7ccdcf4acc106382556869557e451efc9d8672b0d5221da29bb2f838bc85f10725a427178a20c109e2a86a4f8930fd75c20dec1c045279f9fd7e1d0b409027b118f5816163dadd3e8d5a26f96cb82e5e636d591e6ffd5dbbfa235e238de9faab918434f5c1e87e4dc259af589f5fe54d115210cbb1dcb7ece7faf8f345225c06cf183f3831c2f5f110b017ea5c5fc1bbb1c1b0700985d79e632aa60591b6724ed957d451af6ffc01c42682c9ff47e02606513cc15f67de5019308ed6363fb", 0xd6}, {&(0x7f0000000440)="8709700724839b99f38e1f49e67c39c55b7d7a1345839c43525c49875e6721cefc32ea540922013a7c750a455085ad4778f8dbbbd6ff7772100651fb458881ccc8147ef3dd76ecdcd65d3dd3f30b910841ccb15b840b9a9e108c7e184446a409cd7d8914585057eb73a9f1128cbe6a7bd6eaea4b885088715023edb8b74373b8bd5c6508dd4247a229e8694f92fae70df8a8a5a032a341ed59917fe654a37005b3888dd8f8f34a57cb471988904d4963a68702b34c4fed49b17ffd0130f6277c13266f67199c3e2f2e60ebba5b3536bb0cdc2b161363613e68063631543673149e2be1", 0xe3}], 0x2, &(0x7f0000000540)=[{0x10, 0x0, 0x101}, {0x80, 0x10d, 0x4, "4b81bb6ee9474d8dab694a1570f5c83f3538c510dea12e265a528a7603d78f840e851282c4e4dba2fb1da63d23ecf60c0b10ee59dfc8dedb41da03c5304c21358449e8b244436c514f36b890116659e7a2ca874ea016977d222cf7e69a4c47d6938b8ab7aef4e5da4385d04fb907"}, {0x68, 0x108, 0x512, "017d07d2cabcf0b7535ace6610a329bc5ef766e378e8a5f9b75558c69590871cc73b67574c634ceb79c6c302a46aabd858fac883b175d0d51d7cd831c0dbaeb321af7ada5710799902a88cd51f290ec3eb7a74eda9130dd9"}, {0x88, 0x1, 0x1, "1f00e36aed366dc58fd22219d8e9fc3904adfed2b8173b6c48a6852ab7e8bf3c3feed323085880aaf5b77284fed9d6f83a9a82634ad58d830a5409aa76e818941f85fc925af931016294b14389b29b82045534490ba1ce9ee0ecdb3b58978c70cd4d50287334dbef5c0ef9d2419b20089978c0"}, {0xc0, 0x115, 0x7ff, "937f8dda671f7a08c47c0a725fed88086d930c639879fd4e17717b4b1dbfc15e593cf97ddc0f0c76659bd2c641cc7a2834d0076d34742d2e7a831e6c44896dfe08a412c5942056577c820890b3ffeeb773f60b5401caba167a264a55bad433fe0a0d2224cb699c38037d7e77bf6ab25f4b5ccb98da62ca504d44d462a3dc49d84d5a9c086932fde71d7bbd3777c34c7c2bea93952ce4275c87401fd1335e23ab33170886085bb356a2e4517db926d0"}, {0x110, 0x108, 0x4, "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"}, {0x100, 0x84, 0x8, "bcc83b0d53cda45d215702476b9d5a777c864648a6eb5ded5b55bebf305899b153261887e9dd447dd9ad5d88c23685d0fb2fe087de35c05871afdcf9784583c6a30c775e846c0d1773f540e5708f32d4ab78ac34e9ebe3ee41af55b81191030cab40b6c0435bf38e009bad9533e8c6141f37faa7da41e2dd434689ee4929cf94e38e281e1e59047242d712b88a6ce4953f2e54ede639ac137eadf6b12220d62014d3262e5308d2296f8a10e4c7cf5d423cd17ddddd77f137d6ce10df7874ce548671768fbcfded32868b6598265c94105be15e1f74b8adafd605c4114ff35f2901b6277a4709c10d9b"}, {0x80, 0x0, 0x8000, "0ec513346c22b52cb4dfe01b537dd2bec833baf8337da578db5927351893d4e8b698f5ab662c64eb48e733c5d7234eb2d9e8450ad712f536f3a416dc3db9adb3ce04a1051acd2ebc205a30031238668f3ae916fa550059b29e16d18dc3b631f608004e147c8c71a9e15245faf33c2c"}, {0x100, 0x10a, 0x7ff, "21852bc14caaf935a2e2d8b9631b24b9b5b8430d5ed932e7c3864c4b7336f6e3d0a78f30e15f3f75a8d33ef77476fec722ef1aad76db495a06a10d442b7c2f94d27fe23817403acef618e2bd524563246e965b964c86df4864b61d676d713754e32ccea591e2f6aced2f938aae9ee19e4bf60b4d2f73b3297d672060a1c074b3c255a110d368b4cf130c6098466a30ce4a89e1803c58ce22a9c8c6d8c223e1145d2e326ab27aea234dca170dc06003697de759d7546812199b507096561641f8487a890cba68f75ef3eb547497598f498dd0abfeb9b0884a79648cadda9e329f8bb10498fd112f9e15290f70007a88d2"}], 0x5d0}, 0x20000040) 06:02:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000380)="cc6900000000b8716f487cbd8c28af25bc2b2be27b64d33660ffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add6834b5a6515f9570e74561b51d4ff39a6eab0bb6b3b994b5f3630496e756cf88ac5fd0b182a6ef0e3ea4cb35cd994d9eda2d730072", 0x65}, {&(0x7f0000000280)}, {&(0x7f0000000640)="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", 0x10f}], 0xa, &(0x7f0000001840)}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000480)='./file0/file0\x00', 0x5ae9, 0x6, &(0x7f0000000900)=[{&(0x7f0000000ac0)="fc643e7c40eb06a31a865401b559205301d5fd3a2c90ddb9ec15d943f308dc6c88e8197a9e99ad1b2582aa58c7c273c3cae26379432c6e6990eca98b0d832128b6de64a4504d878bab15173a9bb82c37173ce1b58588faffffffff0001ac9a6fc27a6deea3399278c600"/115, 0x73, 0x1}, {&(0x7f00000005c0)="cee0388f417cf7bc6fe204572765745c12bb99f0f88c1815f98a33aee8cfadca1062d1f222ff75a663f7c0e40b93a2384a35545bbadb2e2e5f6affccb3ee660683a045622ccab2b1442d4ae88711bdb4bb7a5b4c8474e31f100340889dfbafeaa62d0ff93a3a6f05caf7787c22d2dc400e29db5d170d71bb55033770e461", 0x7e, 0x2}, {&(0x7f0000000540), 0x0, 0x6}, {&(0x7f0000000780)="c70ea68497187e51b7b1f24930069f66da530c98", 0x14, 0x40}, {&(0x7f00000007c0)="540c6c5852237594a090b615a3cea5decdea25e4408681147131c049e39b20fa1dfd68b06a2899d0f0ad582a4b48219c8f062c940b62dd4c7e9759905d8a474941a53519322445dab7b4659d1e6e84d69e9a17c291141467e39cc0e3a14142da90bf123da1ef9cf703a8fd1ac973110775f022be7a7f92678e14756d3d06e8c8a158ec003a4e9beabf7fc73617bcbd81dbc4bd8e191d4b086f032008fdf067462a5958876ba405bdc4f712a4b0901790163a9479ebf8972c27", 0xb9, 0x100000001}, {&(0x7f0000000880)="a45cd45ce891252fc5c4605b9a04f70d15a8d19ea5382c0cbd787f412662a662cde0cba71089c84233766f289cebd473e3c9bb72ab1b7e6f4ed96411c3fbb3ad8f7518f8d8ce10c97fd28339202b2b8f21b2440f07e6179a55655d6c09b1db28a1556c4481169b08cab5d4c0014040013e572a668dd84c312abcac494f19", 0x7e}], 0x100000, &(0x7f00000009c0)={[{@nobarrier='nobarrier'}, {@nouser_xattr='nouser_xattr'}, {@sysvgroups='sysvgroups'}, {@prjquota='prjquota'}, {@norecovery='norecovery'}, {@errors_remount='errors=remount-ro'}, {@max_batch_time={'max_batch_time', 0x3d, 0x10001}}, {@norecovery='norecovery'}, {@stripe={'stripe'}}], [{@context={'context', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '&(@{{}!\']&.($(\x00'}}, {@obj_type={'obj_type', 0x3d, 'btrfs\x00'}}, {@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000200)='&(@{{}!\']&.($(\x00', 0xf) 06:02:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syslog(0x9, &(0x7f0000000080)=""/251, 0xfb) [ 443.153079] FAULT_INJECTION: forcing a failure. [ 443.153079] name failslab, interval 1, probability 0, space 0, times 0 06:02:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) alarm(0x7) [ 443.194876] CPU: 0 PID: 8503 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 443.202762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.212099] Call Trace: [ 443.214678] dump_stack+0x1b2/0x283 [ 443.218318] should_fail.cold+0x10a/0x154 [ 443.222459] should_failslab+0xd6/0x130 [ 443.226444] kmem_cache_alloc_node+0x25f/0x400 [ 443.231032] __alloc_skb+0x9a/0x4c0 [ 443.234646] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 443.239480] ? netlink_has_listeners+0x1ff/0x310 06:02:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7d}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000240)=0x8b3b) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) connect$pppoe(r0, &(0x7f0000000200)={0x18, 0x0, {0x4, @dev={[], 0x43}, 'vcan0\x00'}}, 0x1e) [ 443.244377] kobject_uevent_env+0x6d1/0xc50 [ 443.248702] lo_ioctl+0x1177/0x1c00 [ 443.252423] ? loop_clr_fd+0xac0/0xac0 [ 443.256307] blkdev_ioctl+0x91d/0x17c0 [ 443.260207] ? blkpg_ioctl+0x8d0/0x8d0 [ 443.264083] ? trace_hardirqs_on+0x10/0x10 [ 443.268317] block_ioctl+0xd9/0x120 [ 443.271934] ? blkdev_fallocate+0x3a0/0x3a0 [ 443.276246] do_vfs_ioctl+0x75a/0xfe0 [ 443.280037] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 443.285659] ? ioctl_preallocate+0x1a0/0x1a0 [ 443.290062] ? security_file_ioctl+0x76/0xb0 [ 443.294447] ? security_file_ioctl+0x83/0xb0 [ 443.298834] SyS_ioctl+0x7f/0xb0 [ 443.302201] ? do_vfs_ioctl+0xfe0/0xfe0 [ 443.306161] do_syscall_64+0x1d5/0x640 [ 443.310033] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 443.315346] RIP: 0033:0x45c9f7 [ 443.318513] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.326206] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 443.333451] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 443.340700] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 443.347951] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 443.355195] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:40 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000ac0)=0x4800, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xff7ffffe) r1 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x618401, 0x148) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r6) sendmsg$unix(r1, &(0x7f0000000a80)={&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000900)="04ee17be3ec4593fd1eb947c105387fbf786f9fbdf68667ce0d8848bf34005152f9bbe414e2b65eef0561798ff3fd9619f8cc2acf57a2508fa3c41ac9c7d56e6e2b61365b3a5e65c378ea0894301d8d8", 0x50}], 0x1, &(0x7f0000000a40)=[@cred={{0x1c, 0x1, 0x2, {r3, r4, r6}}}], 0x20, 0x4024000}, 0x40d7) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_GET_LAPIC(r7, 0x8400ae8e, &(0x7f0000000480)={"fe435403efc3516cbec58a07f7925ee50c945af520d2dd441c4fc3861e64a0e0697c2de6e8e0eb7006094b03aed8c2c7c8018b1ed61148ece66be1a2016f9f3a6a5b6e50d0875aec31f89cf3c30b32329df946459892fae0ba113bcf694268a307cf45d27ecd043014f5d001a1fd63076e6326f7ff4cbb3ae7c883a42e523a73ef5b189eddf4f23080df66967580cfa6e581d9927b56754213546ce3d9eaad92d1a905dea66c5062330bab2ccf31b549d86864911092a961967a1f2fd81a1b051119c230f35e85153752093b924147d9979f2b236695ff02d5bc8a5ed411242dc0f239ddda1c3298d32dda19bf5b22c41da462067811440de9aaed8f5c252ccfcbc9a98456e7ea3f4c7f4744de8e7dbfbc54f6519421b47469e668c7b5bfdf7ab5f173138ec8aa44b7fdffcc98b8884b3a7898e2eddce7cb230e25ad671670cb27d666b359dde7c73f8812d64205715a432e3cda64904fc8976f5c190edf6922e9a98f1a8f22af03136fec6e05f32aee9795e4e23af1712f9eec9d882f194142b7b065fdd2f591de23a792b523e86be2699286059ab6a291a887b62021d9140e44e37c808e62b7474e75b0229e7e844f8798f99e8063f69d8161ba7248a3f2e1031be482bfa9f91040c4e78e359208faa04d4e7bb5b203585a72ac573abe92c561fe6aa7709eb4047a4f02b9209999940a72ca3007bde40c42e6f9d320b03708910e5e31fcd3d0f6ef78700cd6dc8d406a384fdf83f3dba00a1a6d02b171a3c2e9acd5f245ccbb7af8caaa0600ca69797b9623db924bac6f22700b16be693a71a730a7f86b2ec6c4e226069477590fdf489d60856571fea161f71ba73631986f9d98312b9db5fc0e8e217653ac6dc575b7449fafed6c67cc53d7f50bd2a6d3936ac47ccdc326617839eaf04b60f1e1094443ce3c0f1be17849044a9325c323d63dd8e2578cf4a2d38a447b792c540bb2088b291413894271598944196507218b1fcd6b776b85930a9252635c6facaa61442912e4cf7be3e1d8c46915e17005f756b9eb2c70a8e28437c00922d70a6578463b91e6fde6e0c758e633dca3ce2c6a3d1050719c58201818ed13c905d6f90f71f69f6fc3a63466700fa84927f2e29f592c69433d080813f313560043f84b3a6215d03c8845cf903683297e1724f82a6bb574fdf7c5e3809cfd89cb72e02d57150a371f09af3bb06ed0b663baa429daa8f221b66d50b14a21a93bfa36b4f154c494e9c64d512966f5f7e82b138ce77a672b582e7797b11ec952a38ec45af20e0c03a769a9aaf185865f985862d0bc08e0aaf6281af7e321015cdb8d99961d67047ab247e7dcbd3a42e65e8a599677f55c97a5b837c38d56e045f74a0d8ff5b92103b0a569ddb432f730da9376b1ee6111aa26e5d9605907896a7a8dfe4d536f89dcbe86e2123a8b0beee02bfcec19a9"}) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x128, 0xa, 0x6, 0x307, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xd0}, @IPSET_ATTR_BYTES={0xc}, @IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xffff34a1}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x3}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan0\x00'}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x11}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x709918fd}, @IPSET_ATTR_ETHER={0xa, 0x11, @dev={[], 0x28}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'wg1\x00'}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x2c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1}}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}]}, 0x128}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 443.425630] BTRFS error (device loop5): superblock checksum mismatch 06:02:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x4, &(0x7f0000001340)=[{&(0x7f0000000100)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x100000000}, {&(0x7f0000000340)="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", 0x1000, 0x9}, {&(0x7f0000000080)="2a111f62744a458bde19a0a7b7404b71dba57d56791d512231c5fc070f63484a7df69f93367992872774c7b9818db9f1ac578986ba4bb9690123b2191344fa201002c4c1c8c3e8b9c83889e6fae880fcc916c15d95175c398b8e", 0x5a, 0x401}, {&(0x7f0000000200)="dd98c881769db8aeadd6f742635e7a07162b691bbdc64d1b1061dbe48c2824c72fba7d6abea0773a7c47e7c5be3801f99571fb483e007f0ca6cf6752c646210f5d70314fd41d69ded949b6ac1dce87e43f1fc9f566360db27b41de2da543841adaa05a6f1bab86f3d9df1867de43ea479d93b411bc7a32547a81fb3331f7ce234539418ad28164430ca370b815cc1ac4d494480e0278a462553fc38887", 0x9d, 0x8}], 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r2, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3143", 0xff7c}], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000600)={0x3, 0x1, 0x20, 0x7, 0x11c, &(0x7f00000001c0)}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) semctl$SETVAL(0xffffffffffffffff, 0x2, 0x10, &(0x7f0000000000)) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$GIO_UNISCRNMAP(r6, 0x4b69, &(0x7f00000000c0)=""/222) ioctl$NS_GET_NSTYPE(r4, 0xb703, 0x0) semop(0x0, &(0x7f0000000100)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) 06:02:40 executing program 0: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000380)=@ethernet, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000480)=""/125, 0x7d}, {&(0x7f0000000280)=""/39, 0x27}, {&(0x7f0000000640)=""/209, 0xd1}, {&(0x7f0000000500)=""/109, 0x6d}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/170, 0xaa}, {&(0x7f00000008c0)=""/184, 0xb8}, {&(0x7f00000005c0)=""/4, 0x4}, {&(0x7f0000000980)=""/139, 0x8b}], 0x9, &(0x7f0000000b00)=""/144, 0x90}, 0x21) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0}, 0x182a3, 0x3, 0x1000800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 443.478708] BTRFS error (device loop5): open_ctree failed 06:02:40 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x24}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x1e4, 0x0, 0x706, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8}, {0x1c8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x40, 0x1f, 0x20}, {0x6, 0x81, 0x1, 0x80000000}, {0x6, 0x9, 0x1, 0x41}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r7}}}]}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x6) finit_module(r0, &(0x7f0000000380)='b\xc5f\x80\x91\xfd\xf6\xf6\xa5\xeb\x11br\x00<\xbd\xb9\x84\xd4\x9aT\xce\xbc\x8d\xfaa\xbc\x82\xea{W\xf4W\xdf\x0e\xe7\xfa\xe7\x06\xe7Z\xd1`\x84rE\x92\x06s\xcf;\x10\x8e\x89\xaeeN\xf9le\xde\xd9\xe7\xfa\x059\x1f\\\x1e\xa7\xc0\xf8\xa2\r\xea\xd0\x13\x9eUno\xe1^\x13\x1d\x12\xa5\x03v\x99\xb9\xaf/V\xb5\xb3E/t\xb3\xffc\x8e\x83{\xf5\xf0{\x98\xa3-\xf4\t~M\xfb&\xae*\xde\xaa7uF\xcc\xf8\xaf<`\xca\x1b\xb7\x89rm\v\x13(\xaf\xcf\x00A?\xdb\xbe\x86\x83\x8d\x9dA\xc7\xbcr\xf3\a\xa7\xa6N\xc2\xd0:?\x94\xc3\xc2\t\xe6\x1dA\xa5\x9b\x89W\x05b\x9b\\\xed\xfav\n \x15Y\x9c\xe8:\xcd\xab\xbe\xdfsT\x1b\xda,)8S\x1ce\xad4x\vJ^\x82\xa1\xf6Y\xd9\x8f\x99C\x038#\xda\xe5\xd6u\xebf\x91\xab\x91\xd1\x13mRC\xe4\xc5\xec]\xf3T\xab', 0x0) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x9, 0x1, 0x2, 0x101, 0x7ff}, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r4, 0x1d1}, 0x8) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{@fixed}]}) 06:02:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x4) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0xc02064a4, &(0x7f0000000180)={0x3e44859e, 0x4, &(0x7f00000000c0)=[0x2, 0x7ff, 0x3, 0xe6], &(0x7f0000000100)=[0x2, 0x20, 0x4], &(0x7f0000000140)=[0x3, 0x40]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x89, 0x2, 0x0, "f1ed38dc65208e683458e9c98d300291", "98a04f97e5e598e8290ce50f8d745e848e195534be7f72884f67103d4c0ca9041b5a445c72774095b3a0670b9688b2810ae51ba945f5a225b9b032b02f1fc47746cb4d62b7e5ed10615b414562e215aebef328103b5e39db89ec5f1ac96c91f9c3a7fb949ada17a8b93a249cd489dad92187d721"}, 0x89, 0x2) 06:02:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x10000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') preadv(r4, &(0x7f0000000500), 0x37d, 0x0) socket(0x11, 0x800000003, 0x8) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) [ 443.693621] FAULT_INJECTION: forcing a failure. [ 443.693621] name failslab, interval 1, probability 0, space 0, times 0 [ 443.693676] CPU: 1 PID: 8563 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 443.693681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.693685] Call Trace: [ 443.693705] dump_stack+0x1b2/0x283 [ 443.693720] should_fail.cold+0x10a/0x154 [ 443.693734] should_failslab+0xd6/0x130 [ 443.693745] kmem_cache_alloc_node+0x25f/0x400 [ 443.693757] __alloc_skb+0x9a/0x4c0 [ 443.693767] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 443.693779] ? netlink_has_listeners+0x1ff/0x310 [ 443.693790] kobject_uevent_env+0x6d1/0xc50 [ 443.693808] lo_ioctl+0x1177/0x1c00 06:02:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x3, &(0x7f0000000340)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000000080)="f4dabee6b8f90f70c657c3f8bcc672bec1449ceb45ee41f35f22755f95f78f1afd24beec3663e78c83d2d4a62c156f4b0cadf0f331cdbcc1b102b184953480454a21dd57c8e8413da96eebfd4e5c98a9d69d3c278e01e2d03e8e389097d4c253c1869710a779bcdf8ca4053cb8b38cb5352d26872574a8a9f55b1790d8bc767d022fac9ae09b35be5a0a2e27cd030e0cc19390447ca3d3cd96816a4e952628ce159d677ff98f0523c2b9e250c4cbfe76008d03cb84bef08a0a5e59021d9fe0901bd7aa4d49f6a544b671a1dbb7464a5566fd7cf7402ac906ff9594bf41c6ccb5953e932a67d02f44f19fdcbd202994", 0xef, 0x100000001}, {&(0x7f0000000200)="e5e209f8047b90a7b7df403c57fd49c2446d68171cc30f9ee25420f6f44691bc7a4bec8ad2e372448218baea86d16c68b2b5334f50d2c2ac176d5d0670e40293c6847da516a31e330911043fe0316f57af23", 0x52, 0x1000}], 0x0, 0x0) [ 443.693821] ? loop_clr_fd+0xac0/0xac0 [ 443.693831] blkdev_ioctl+0x91d/0x17c0 [ 443.693839] ? blkpg_ioctl+0x8d0/0x8d0 [ 443.693847] ? trace_hardirqs_on+0x10/0x10 [ 443.693875] block_ioctl+0xd9/0x120 [ 443.693883] ? blkdev_fallocate+0x3a0/0x3a0 [ 443.693891] do_vfs_ioctl+0x75a/0xfe0 06:02:40 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 443.693901] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 443.693909] ? ioctl_preallocate+0x1a0/0x1a0 [ 443.693924] ? security_file_ioctl+0x76/0xb0 [ 443.693932] ? security_file_ioctl+0x83/0xb0 [ 443.693940] SyS_ioctl+0x7f/0xb0 [ 443.693946] ? do_vfs_ioctl+0xfe0/0xfe0 06:02:40 executing program 0: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r1 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r4, r5, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ftruncate(r0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="8da49d3ac0ed02000a3da70f2d01004dd4b06bfe9706ea51cc417a00000000001e1b00b10efd9a000001000000000001fffffff60000005f42485266535f1f134b5e891af84dc88564d11fef9f653c96983382f17c295dae35b3122eb5127d591570d6d61dd774eb12668d787af9c2ab5ff0f0ff526cd87e6727ebd5c4f96abdd899603ca0b3dcf23f3c9bc505a688ba6cea1c1ccc937b884d72639c4201d5e8241c85d588fc38c8af63a4014a7642abc7f240ff29cb357d787cc72ddf5ccea3bca00cf8044eee4bb84123d9dec523e85baa9311805f8641ff449f469bf6c9045f1fc71b4dcea5f6f0720f69de0fcd7b42", 0xf1, 0x10000}], 0x5, 0x0) 06:02:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f00000000c0)="e304b02c1bda64c276776037dab668500be72778d631cda016f92a93eb3022517636b276f1c0680c3e8fa85e2e9583f894a8b922520ffd8a7bfcdf62e98f9fca9a0885191f5fe2bac669937b22ca401f11d35f832707b67b7505388c97ed12b6f14c56daaf0acf440f510b07426c52dc3a6aea24b91c679652e059f89ea23369315a83917b95f2e057a70221671800c90975df2ccfd4f9bebf37aceb6a0c497d3dfebda183dfc4f8", 0xa8, 0x1b}], 0x0, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x301140, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000200)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x4100, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x1c) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000080)=0x2) [ 443.693957] do_syscall_64+0x1d5/0x640 [ 443.693970] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 443.693976] RIP: 0033:0x45c9f7 [ 443.693981] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:02:40 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 443.693990] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 443.693995] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 443.694000] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 443.694005] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 443.694010] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 443.695227] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 443.727648] BTRFS error (device loop5): superblock checksum mismatch [ 443.768890] BTRFS error (device loop5): open_ctree failed [ 443.781165] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 443.961820] FAULT_INJECTION: forcing a failure. [ 443.961820] name failslab, interval 1, probability 0, space 0, times 0 [ 443.961830] CPU: 1 PID: 8602 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 443.961836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.961839] Call Trace: [ 443.961853] dump_stack+0x1b2/0x283 [ 443.961867] should_fail.cold+0x10a/0x154 [ 443.961879] should_failslab+0xd6/0x130 [ 443.961889] kmem_cache_alloc_node_trace+0x25a/0x400 [ 443.961901] __kmalloc_node_track_caller+0x38/0x70 [ 443.961912] __kmalloc_reserve.isra.0+0x35/0xd0 [ 443.961923] __alloc_skb+0xca/0x4c0 [ 443.961932] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 443.961942] ? netlink_has_listeners+0x1ff/0x310 [ 443.961951] kobject_uevent_env+0x6d1/0xc50 [ 443.961967] lo_ioctl+0x1177/0x1c00 [ 443.961979] ? loop_clr_fd+0xac0/0xac0 [ 443.961988] blkdev_ioctl+0x91d/0x17c0 [ 443.961995] ? blkpg_ioctl+0x8d0/0x8d0 [ 443.962002] ? trace_hardirqs_on+0x10/0x10 [ 443.962020] block_ioctl+0xd9/0x120 [ 443.962027] ? blkdev_fallocate+0x3a0/0x3a0 [ 443.962036] do_vfs_ioctl+0x75a/0xfe0 [ 443.962045] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 443.962054] ? ioctl_preallocate+0x1a0/0x1a0 [ 443.962069] ? security_file_ioctl+0x76/0xb0 [ 443.962093] ? security_file_ioctl+0x83/0xb0 [ 443.962102] SyS_ioctl+0x7f/0xb0 [ 443.962108] ? do_vfs_ioctl+0xfe0/0xfe0 [ 443.962120] do_syscall_64+0x1d5/0x640 [ 443.962134] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 443.962141] RIP: 0033:0x45c9f7 [ 443.962146] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.962158] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 443.962169] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 443.962174] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 443.962180] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 443.962185] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 443.979964] BTRFS error (device loop5): superblock checksum mismatch [ 444.020567] BTRFS error (device loop5): open_ctree failed [ 444.111503] FAULT_INJECTION: forcing a failure. [ 444.111503] name failslab, interval 1, probability 0, space 0, times 0 [ 444.349640] CPU: 0 PID: 8620 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 444.349646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.349649] Call Trace: [ 444.349666] dump_stack+0x1b2/0x283 [ 444.349682] should_fail.cold+0x10a/0x154 [ 444.349697] should_failslab+0xd6/0x130 [ 444.349708] kmem_cache_alloc_node+0x25f/0x400 [ 444.349733] __alloc_skb+0x9a/0x4c0 [ 444.349744] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 444.349756] ? netlink_has_listeners+0x1ff/0x310 [ 444.349768] kobject_uevent_env+0x6d1/0xc50 [ 444.349787] lo_ioctl+0x1177/0x1c00 [ 444.349801] ? loop_clr_fd+0xac0/0xac0 [ 444.349812] blkdev_ioctl+0x91d/0x17c0 [ 444.349820] ? blkpg_ioctl+0x8d0/0x8d0 [ 444.349830] ? trace_hardirqs_on+0x10/0x10 [ 444.349851] block_ioctl+0xd9/0x120 [ 444.349860] ? blkdev_fallocate+0x3a0/0x3a0 [ 444.349869] do_vfs_ioctl+0x75a/0xfe0 [ 444.349881] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 444.349891] ? ioctl_preallocate+0x1a0/0x1a0 [ 444.349911] ? security_file_ioctl+0x76/0xb0 [ 444.349920] ? security_file_ioctl+0x83/0xb0 [ 444.349930] SyS_ioctl+0x7f/0xb0 [ 444.349937] ? do_vfs_ioctl+0xfe0/0xfe0 [ 444.349949] do_syscall_64+0x1d5/0x640 [ 444.349965] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 444.349972] RIP: 0033:0x45c9f7 [ 444.349977] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.349988] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 444.349993] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 444.349998] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 444.350004] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 444.350009] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 444.372485] BTRFS error (device loop5): superblock checksum mismatch [ 444.419791] BTRFS error (device loop5): open_ctree failed 06:02:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10001, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x61142, 0x100) ftruncate(r2, 0x80006) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) recvfrom(r3, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000240)=0xffff, 0x4) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x8000, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x2b, @local, 0x4e24, 0x1, 'nq\x00', 0x11, 0x8, 0xe}, {@multicast1, 0xce21, 0x0, 0xffff, 0x1, 0x9}}, 0x44) linkat(r2, &(0x7f0000000140)='./bus\x00', r5, &(0x7f0000000200)='./file0\x00', 0x1000) 06:02:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x1044, 0x0) 06:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000380)={0x1, &(0x7f0000000280)=[{0x200}]}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0xe4bc0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000240)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x20008004, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x30008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=r4) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r5 = dup3(r0, r2, 0x0) setsockopt$inet_dccp_int(r5, 0x21, 0x3, &(0x7f0000000040)=0x80001, 0x4) 06:02:41 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 444.788639] FAULT_INJECTION: forcing a failure. [ 444.788639] name failslab, interval 1, probability 0, space 0, times 0 [ 444.842650] CPU: 0 PID: 8669 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 444.850463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.859809] Call Trace: [ 444.862381] dump_stack+0x1b2/0x283 [ 444.865989] should_fail.cold+0x10a/0x154 [ 444.870125] should_failslab+0xd6/0x130 [ 444.874074] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 444.878715] ? kobject_create_and_add.cold+0x3f/0x3f [ 444.883794] call_usermodehelper_setup+0x73/0x2e0 [ 444.888612] kobject_uevent_env+0xa79/0xc50 [ 444.892953] lo_ioctl+0x1177/0x1c00 [ 444.896557] ? loop_clr_fd+0xac0/0xac0 [ 444.900421] blkdev_ioctl+0x91d/0x17c0 [ 444.904283] ? blkpg_ioctl+0x8d0/0x8d0 [ 444.908145] ? trace_hardirqs_on+0x10/0x10 [ 444.912447] block_ioctl+0xd9/0x120 [ 444.916045] ? blkdev_fallocate+0x3a0/0x3a0 [ 444.920340] do_vfs_ioctl+0x75a/0xfe0 [ 444.924126] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 444.929753] ? ioctl_preallocate+0x1a0/0x1a0 [ 444.934140] ? security_file_ioctl+0x76/0xb0 [ 444.938535] ? security_file_ioctl+0x83/0xb0 [ 444.942917] SyS_ioctl+0x7f/0xb0 [ 444.946258] ? do_vfs_ioctl+0xfe0/0xfe0 [ 444.950211] do_syscall_64+0x1d5/0x640 [ 444.954077] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 444.959241] RIP: 0033:0x45c9f7 [ 444.962409] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.970091] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 444.977334] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 444.984665] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 444.991912] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 444.999155] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:41 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYRES16=r4, @ANYBLOB="0000000000000000001300000000905b87c85a0e8eac2095be82189b3177670198c184811cb2b4f02f083bb7615c04b440a7c73108d075885a6264719d515ab752bf727e7ad33c915bd6c773165130092114ad1d4859a5c352fec76a5ed6e44ce3"], 0x1c}}, 0x10004081) r5 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_REMOVE(r5, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="240000007499134b0000000001000000536c1b8972ba534c992f3099eebc0f9f20b393287d0c61cc88ce518cf7e90426075b41abd53cb5d37f59ffd3329e68b08284b67302c376e75f91dbfd63daf6a6722b8db2b91ac5ecdba5650195a66e6494076e2e8d0965c9d1cb281d2cc3c18c", @ANYRES16=r4, @ANYBLOB="080000000000fcdbdf250200000008000200020000000800020002000000"], 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x1, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48011}, 0x4000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r6, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r6, r7, 0x0, 0xff7ffffe) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x64, 0xf, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000005}, 0x4000040) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f00000003c0)=""/72) 06:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f0000000380)="59ca8b7af8d28123b3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705f7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c36c4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadacad90cd56e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xe3}, {&(0x7f00000000c0)="bb8785720ebfb367f4672d599d3daba3c727fcfe149a2701e4d73ab794bc55048461522246dd53455f6c2aeb1a920c140c2b419d9da1e999b6efadae2bf0bd30f4a1a78049492f97ba5c8a8e445be2390a137a1620e838e932a7bb31f07c980d84826e88d4cae96ab43c9e491ca21ce3e6c92961b55a3a8a01bdd87dc547764045bdb6bb6dfc5fc920ee79f10558a33ece3cf1eebfade6fc34a73c9fb086c197b67cb4c51617b6c56c0eb728f8ed4fef6dd417ab9ba921bd0a821b31cd1d26917edc1521d6b162bee570f247ff83221b8c103dae36596b62ef753bf9a4326e", 0xdf}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000480)="e82cb805ec4fdb276e458b28640109f1e565c5a7b90a2a56e5d8a650fdc8a572ba8e5e509b7b75ec392a7f1b2497983713bc9b0bdffd45cbade25dada8096121586a84f63c1713f0ca72a92f0e5c00bbe5b5c1247f55427004894132ada19c9491"}, {&(0x7f0000000200)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2b065e876f3617059c6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d4311007b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x9d, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x2000000010000}], 0x1000010, 0x0) [ 445.110128] BTRFS error (device loop5): superblock checksum mismatch 06:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f0000000640)="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", 0x19b}, {&(0x7f0000000140)="7b504bd799a74c8955a179f5fce698616eacda7426ec03c0131ef46ec7bd2ef8f3ce539591e8ec752d904ffddb6eb8851831c15d1f13", 0x36}, {&(0x7f0000000340)='\x00\x00', 0x2}, {&(0x7f00000000c0)="45e947f8b7480c05661f7e6eb2239baae9839ca90d85a95ec6d1054c0c339e00bdf6707f7f0abc22b1cff995f3117cc8332abcb093c38e800fc5882c53c29c55a2b71a35df51a9839af6a112f36b", 0x4e}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)}, 0x20000000) r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) setresuid(r2, r4, r6) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:41 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 445.181269] BTRFS error (device loop5): open_ctree failed 06:02:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getrlimit(0xf, &(0x7f0000000080)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r3, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8005) 06:02:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80a0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 445.317882] FAULT_INJECTION: forcing a failure. [ 445.317882] name failslab, interval 1, probability 0, space 0, times 0 [ 445.342056] CPU: 0 PID: 8714 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 445.349864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.359207] Call Trace: [ 445.361787] dump_stack+0x1b2/0x283 [ 445.365412] should_fail.cold+0x10a/0x154 [ 445.369562] should_failslab+0xd6/0x130 [ 445.373537] kmem_cache_alloc_node_trace+0x25a/0x400 [ 445.378739] __kmalloc_node_track_caller+0x38/0x70 [ 445.383663] __kmalloc_reserve.isra.0+0x35/0xd0 [ 445.388320] __alloc_skb+0xca/0x4c0 [ 445.391928] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 445.396753] ? netlink_has_listeners+0x1ff/0x310 [ 445.401491] kobject_uevent_env+0x6d1/0xc50 [ 445.405895] lo_ioctl+0x1177/0x1c00 [ 445.409509] ? loop_clr_fd+0xac0/0xac0 [ 445.413372] blkdev_ioctl+0x91d/0x17c0 [ 445.417236] ? blkpg_ioctl+0x8d0/0x8d0 [ 445.421109] ? trace_hardirqs_on+0x10/0x10 [ 445.425345] block_ioctl+0xd9/0x120 [ 445.428951] ? blkdev_fallocate+0x3a0/0x3a0 [ 445.433248] do_vfs_ioctl+0x75a/0xfe0 [ 445.437036] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 445.442645] ? ioctl_preallocate+0x1a0/0x1a0 [ 445.447034] ? security_file_ioctl+0x76/0xb0 [ 445.451424] ? security_file_ioctl+0x83/0xb0 [ 445.455810] SyS_ioctl+0x7f/0xb0 [ 445.459156] ? do_vfs_ioctl+0xfe0/0xfe0 [ 445.463115] do_syscall_64+0x1d5/0x640 [ 445.466983] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 445.472152] RIP: 0033:0x45c9f7 [ 445.475315] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.483001] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 445.490250] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 445.497488] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 445.504740] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 445.511985] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 445.539038] BTRFS error (device loop5): superblock checksum mismatch [ 445.588773] BTRFS error (device loop5): open_ctree failed 06:02:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x17}, {&(0x7f0000000340)="59c163991b665219daba6a2d28043e3d90ebe57a2cf238a28ed314ddef5058616586ed9df19a627deb18f5173b2b1fca2b5564339e0370f819aa37203259f03606e746b8ec166100638860b8ab67e2beb0607bf35bc950088045e0951fdce8ebded2d32109c7eb95609dbe6aabf20e12b85e07ca019bd5b046e0a0d1c0c2c4677d9fa1fbbc7b6ce2d0b423a90257dc4ad0fb277b432ef486f4a0299befd1c5aa8577d088ce80395cb1f4cc2971312f0f1b915c4201890a088c4f21ba2bfb6085efe6f9d98d092a13307c686ae362b7804310638b4bf9127c7701b03438098c1e033bd64d63088c30c26604b4b7d059381427feaef12610c40fac07785bf285569d5d1282aadff4c56e3197a5f1b9949c25f65e6f6c9cae342bd27c1de1052069d8d5eac70c57be1fa7bd6e436632c7208610ba97fabbc02171aacdd361a13cdd0b261fae8ab9bf073915d4f61bfcf20003063b7cb04b90876cfdc89d717416ce7a821d6ab88872a94171ea03e293488a11033e71651e47977c3609efbec860e92f17bb56b03bdd32574915ebaadad44eecb9cf5da8b85a9a31a9104f1c881f07852db872d1f4c92acc40ce805516df16a9e625d7a5f5b9b6eb67ca5093b1281cf482926feef498f7c11591dc151a5b12124ba1ebedf6d2289ae29bbb657bc94829ea1df4191febcc0d8cf269c86172dbe5a78a80cb1e6e1bc69eb2b653e1135c6e3931b67412fc74c7c8a6e2d258569400f2b62812e020803fedc5ef9c897f5c65e4f2820c3da20b29b5ad1bca02c5a571b5071c6742cc2918c9a27e69f2562a681aa5d3ad147fa7aef15939e2f60ba3443582b666ecab5c65c6f40303b8864cc166a056e203646b42d72af1a2afb2a6ba5ffd4a5cf02a007d554ed9543bf5ad11fea0300bc89b33b0714e451ade938c3f934a595a2033f7dc8f6a47449b10da353271bb730ab8bd229262bbb6ff47cf670020133b22fd4a6fadd5ed5d3e01bee97d072f9f918a1954a9d17643a1c4e17afc4d940ac3a5ded862e6529fda82d9b2b3465e675ad8a2ddbd8c9d1242c69a43516561220da5e06c3727e13b8e0bf853b62f5900047a1f1092c824e782f02eeecb7b333f7e1a89c4e882d1dd32de467bf9cb44323df351fca757a8515309c26dc86f3e7b1eb9190ddaeae5255721c9e048026b24f4728f8f1d7e5a4fc32a6b5267c997f9bdd98e54b56ab52b684ca90156b72c955bb1198efd6be5bd9854ab4220d60cf39038903dbef40bf7c2198a7ba4270aa11b10d1beeb99b50c1c5b7cbdcb969aeccce90cdd7d44b0e757bc9fb35f42d4131a286d0cb1868544379b13e171af2107049125bbeb2fd330cccdc152856ad99baecb3ebb5ab1b880a5c913c127ee6d4de72807505d99903fa48bf3f83653fdcfe7f6fd28ed4d912c73286e928110ef16c1f4094ced0da92632494bc7fbc33755ec3771203ab77df81ba5b5df788ed54eb9bb6687dae25bd5109fe5b0803a6a28d876dc9f56c598ec3945f0911de4b93a05668e349862bd241b9c33ad8bbc895d67ebc7a5ff43b347983307706bc8cd899210382e41d3d13b621f99a4831e3daaf632a056fb983d0d81fd4c9bb87fca0cb5dcf10653ec086e3cf5ba9035a2e24a959c6146ebdabf0ebc678b3f83c08e4c6e44299b616a03a76246c497639f43af6b7498fe37b727a7f2fb00d43615a8c0bf778d3301b4893eca845d7a81c791256c6fd3fce6dcd283e373872050cfc7cac6af49930a3405f37652da116258f935e81ad8789fa3b46fd231cb87428fad1e03ded28c9234922d3d4d5ea1033d84f9cf7f179baea9c4a86e01b14be70fff5a5336a71ff62715bbfad98e32e6a72d66d9d30f10585026fd9af11ae1fd14442ecdb64e3f85a864726e12f7a3d87b4c1312a7434bc0367500eab6df8412ecdf96024757fecde17f42529186bea0c4c8d204b220cbf665bb532c900e6420b65ebcc480f789d9cc756febc7784667fcb2070006d9985efb3e5c78ff628300731d0104afa93b30d10016308648d342eee483bffed34719bbb9c6d1cd982b60fa990189fac84e69ece28ff49bfc568b62ab0472d8058b9fe672229376c67d508ebb225dfcad92f1f1d3949d6def2c475a71e3da976d342dc040224ff310a6a8fc44c61ff5f756bc4f8a0b2b71e42aca17a3c84671eb84131779c9c9512ecf502544888bf43a02cb81d990762f5437b6c1abae2591f201d0afa8ba850d9bb62054f5148fe0246daae990ca898ee95034fbe42c24cbde3b8c17d5d89bdda479b3c7910d081cf33159695da74a357eda484a42ccce746891b64bd99be70870ff4c7513828e6b39faad523bcbf212418e9e8adf3632a11f4d4f71b9afb4db59952b2036b76d8e3a71fb1c205af8acaced4089d084eccb55a87fe318994937f6b39c0f787793f72c151aeaf71be66b721c499ea490332951c4e6a6f9648c4037b4d6566f60e063df5877a855af174e07fc1f33d851bebe42996db00090fc28ad73edd6a6df270433ce9e3067a268138a7345ecacb03ab7f32e0de4f77d062c461a4073d8623fd4a4ec389c56444d26cbb097e24ab0f85ff120df9d05bc04fe50a4067d8b715e6f25fc35d6a31e0d5f1ffd0e1a89dd2f6758c3105e5862fb54162ce0e219e80bf75871701e451225fa7ea8b638c1608d1fb8a1da1d11cba9fc8166ea48a4950275935fb8cc06d374753b57a77adced569e7b924bd350d5bc0df33fa3e3b9aced81e0a5f5b3e427c2ac7f31117734495eb1dafba7701c0a10d730bfda1f20d3cc44ca238aff256b2ad0f5967864e27d29b3c3237bd53d24acf4cf92d3a75a69112ab32a915c16e52c05879eb1885d6f67b9fc3d54b604ceae79d1076f3c35dc0068fa726b6dc7301644fbef61d25966ddfb4b4c8a57f73970013eeb6edfee35aa02065d1bf073eb190382d17deb774b3b445f44d3abbee9ba14a41c3e5204a7ada6f1e212b332a22af32a98ff77616609cca352bd75f8f2111e05c8fa53e1a8d227bd15139b6984d4e07ee04384aa6059f77b6b89eae80e6454c9cecdfac04c55c7228423b4ae87fbfd33372795f7ca26f577630e61868be1102b5cab9c8f6bcd7a0c257bdb9ed964a65d283b880fdd78cbbd6dbdca8b8004662533f8a3853c6552e233640518673f8fb279091cecee4834d5816e639a0c749bcf420b8be771e863ae7076b7a13036ee836d1db2dd8c0b3078029c4a0ccac0859bb2bfe73fcbfea22bf75a7410fd7a5a66129140c121a756117a56830711680cf798ffda49ec5e0a1166368273dda4e21e8889126f215ffcc6ec031455002c50b75827ed4c58ae1a9dd7ec285ad638c210c34f17a3c266ef3f5f9313432ecbd766176fa557886a3c9b4283241861059c914bb4a6041b5fc656cbf90a1870b01afbbf531ce6ea34fee4b408df2e3634300461b018abb8ab46e701222971b2854ba239b5b20655394cf2ac3ab27f94eb000d3a773479bed2263e1d84d43e992d7ad33d0b54701bd5d03d2e8b02ddb17a830fdc6bba04125c1ef4bc5176d0c263c0f59cc1aeb2ef63dc948e4d75370f82aff276bce7783d0f64f5fa44c68d5e3e292d2651d65fcb0eecd66db68171ce7740b6ac2af3319e7dd89dd368767f21d4aa194032b1138d6572799b797cef31e15da36ffce25773a0212e8c3c74a620d17475f22fe37c804c1326574919fa8106b3ee68e1855db411ab58f28ef1f6084f09c9800085f3a42b6162aacd5b445972c7c6c8eac80c3584b68825997a5e89624487002aa2dcaf1e652371bb6df6317333ec78aaca67222e9442b75fc6c9e94bd94d43b3b5bf585f9d29fab454cc9ba6b0e3a1b116181021dd9eaf2232a491b2f0c8088e58dd4ce6903c52b8ed591379ac5a17c1b6b4ca12513bc618731042064351dcd72b0659da7ea21771fffecbc096f81c32b979d9e4da3fa3efd401191fae0b9e124c5346b71c8a71d6e29ff1059b5268ae60b4d797cb599438420176359c73af4fb03097f05f0c02d880ddbfb08724235d1e9f5cc23bf3e7ff148963cdb09faffbe35340d64e91a444dda5dc0e54e192a40d7087b1c416c3a256e4bb07a166ae5020515b563ca2b2679fee7163b61c5bc0c2a69bfb3cdbb82ed46cac666a5fc6a333b56a40961cbfa70d58036b81cc11139ac43cabe5522786106e22812b8c1465f722163dcc6b2fe0ba9d01ab5b9d9d5a577826489efdbd0df78297730cc85247099f834cbc1f21d43b93a92e433b7daf92733c133c5b365cd05e092d746bae33a8a0e9c8f60543a546aa45720ba502f482e4b2a0c17fc441e2b1841762d0adce390eb225d68779556f68ec1a2de882d38c0b256cf6390e46147ccd6bd8d85ebd1f7b8aa7d4f9e49616f47bf94479de6953c28cb5e41c5d79a843407fa524e6d20f0d033856ca415d37230b13c0275c97732063a4cc48d66bd13ce3063b7b336904d87e738832cc4413245bfbbe4e90a181bfcf33f40f0a29e6c0c31b7df74e0dd44f0c0d75d755351d064d090ada5ba8fba7558b6e2359334e2d2977e073fcf48f1a104fd23d9c40809274d570946d9ac2ab34c196befa21d7c3ec0b75dc9e224efca387aa49ca185151f55e3ad5b21b533f2439d5e2b99b33c4f6eeb64465208b4191a237ad17a45201d13d1aed16799acbcf7d0bad650a6f30f51fbf4e59b8b4db4350cabb33190d7d5735fb0482c4e7493090c386aaacf9011adce23576dab0d9f1b6a948f1fc9f27f579c6f09a1471e98ddbe29a1258a758fabf4b21500a70ad9c0a58fc8d5c777403d778c2569f4be9f1de78fab9155e5043b91f5e3aa8eab9d87f2f3d1eb90bc2417e59a42a931edb6f49cc1c6b0f468959f86e6d9e40d218af2f40f7e88b07a5714a40a1556cad301248015dd76abe81d3fea9b9d53ffb3b7da41d136737d92a3b7e5973180a6417ccd56596dff2243b99163b1ee48eec1e0271634825990f4826a327d09c60c9e9f8df6363779e84fdb860bd0078e6d1be7fba56948ac6f3363077bac757ffe4c8ed76f55e3428127583fdc92e520d9cb0089be93b8e1fa770db51bc5ca9b130da23e24d87c82b9ba4f164fd4e4c8b636a96ecafe55ae640a3305e1860e5084eeded2e12e0a5c15aa9556ae5742442b55ab284e126405802edcb05654e15d3ee224d5e8a1d3d6f0efc8b66a725918fadfe0ec866f24f297d4a6a70a2a231c7b41026cfb83d843336d82e1a57b761490fa8834343b1b38103c2839d714dd7f2035ece944b9d7090ce4725176e26736579b168691242ba0e8dc9959326055049605fe04aecf47e3873bc3177fa8cdc1ce2e38b550832daf21780365764ccc0664dbb51f7816e720b59d264a49b75de70b0d5f76db7b99895a5d207c23a18a8738d2649eeddafc8d8f41dae11ebb6bce61af517bfb3929fb4ba874af39136c915b9d0729e5ae35c65e2947c502d5a7ef7add362ce2b179f1a7d91022b39af69a0cb87a36ccf68818daa3691e6a27d80714adf8f24db2984f7c22ce66f57fbeebe0d85d8bd324630af89f80c8b54be06caae3272171abe364bed6631866a2aea78d9dd8ed24e119e492b97264da6187ce1a1a6c6d017a939235b2c52f40bf2cbd3329d8466de55095adafe82cebec157489fa0692791d9fae805d11f9dd9c5c5bf4e6b8fe063cc57185fd183b4f261ae3a0338de0f880bad89fab53b8a1c2420fbf8522d57717341217c7078a5c5030c937ffdea92ee69fa79b1cb1ca445f0e18ba0c21ef8ca8e23561779d1b07c1058a4af0bcb660144e6a103309c078403", 0x1000, 0x80000000}], 0x2893022, 0x0) 06:02:42 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) setxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:scanner_device_t:s0\x00', 0x26, 0x1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4373ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000e3f6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = geteuid() socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x56b002, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r7, 0x80006) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r7, 0xc0a85320, &(0x7f0000000600)={{0x96, 0x20}, 'port1\x00', 0x8, 0x40, 0x400, 0x879, 0x1f, 0xffffffff, 0x2, 0x0, 0x1, 0x2}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f00000005c0)=0x100007f) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000780)=0x10001, 0x4) syz_mount_image$xfs(&(0x7f00000006c0)='xfs\x00', &(0x7f0000000700)='./bus\x00', 0xfffffffffffffffc, 0x4, &(0x7f0000000900)=[{&(0x7f0000000740)="cafe01c32cea763770398927284c82d9", 0x10, 0x10000}, {&(0x7f0000000a40)="e50980495b2fa4aee5013115593910e45fdb17181394a45ee4fe342cd779a6eb7f03635a3fe60b13a199e66a68773be318ecfb69333ed940397c051cac45dc4f14cfae0963abf34205edaa1c8e765e034fc954300ee1f1ba84771bdc9831cb8ed7c9bbecccda0066774ee84502f277fc7369511085ccd6505edd559c80765b999f32aa509c40f76c08b83eb155321e3bbc24d6d52e4eac71ba29ab0d3f66740c3bcf556d7239627e1899d20000", 0xad, 0x40}, {&(0x7f00000009c0)="aa18719ce9c9c4964fb6afb4cdc8e0b37c8c0ac8b5349e8784776b8138033d0b8f94f42899975e79ff69811d7afb740af4af0606a2080000008091c2ac536fad16a433d266c16de0d9b30236652d96e9", 0x50, 0xfffffffffffffff9}, {&(0x7f0000000840)="bdfc4872c2a5cf238ef8dc69644bd32973c7f43663f9a688d3bad2dfe8c56621875055ac56673a38b66f74531bc16567b64f0e6fe981ac986556fe482eb7bee5316d1f8ef07ebf7f4e400dc823e747af4f0bd59d415752344db24f2de76334b7526852913ab83a88aa9f7048db49a0cf071fd55236c9920282ef4130ca84f5b2aeacb29baae3916141c134ace81b6acc3b8f9014d404748cb2490e66e8d3861a828e27d7108eaa4d8f69ce30bed6ccfcb44ce1ae08f4c41b0da6b7f8", 0xbc, 0x40000002}], 0x800002, &(0x7f0000000980)=ANY=[@ANYBLOB="75737271756f74612c70716e6f656e666f7263652c71756f74612c6e6f6c0ac07974696d652c6e6f757569642c646f6e745f6d6561737572652c00"]) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="bbaf05ee638f", 0x6, 0x8}, {&(0x7f0000000340)="8e8d1c4b358dfaa5fe388c3cd3a3e94de1e00282087943ba89cd30f673f0842609dee756346d96dac045a3c8dfa57e8b59962dedb99762c68f6eac598b6a682f2bb56b76b9eade6160c178fee4302f09b53063ab1be52138c3408ad66a4d475b6b1d33166b67698228f9ebdabb4b16094e5977a71d4f3d784f37e331fdf489481a33a2991a2635000031de00a5bee661090700aeaab725b22486817831e75fbcad83a6c6f90424ed02267132b70432298e52187026a059b3c576e0e6c1862ef09082b249bd92c830", 0xc8, 0x7}, {&(0x7f0000000200)="9007abbbabc216511984aed38ac5cd4ade8a440a4918265b09df03650cb00a15c57cf86a531e2cb3d4c69adb532637d3248e61fbf850510c0e88654d88e1559c0a7b06b2f06464f9a9f59cf28dfb426bb40000601eb5aff9e48a069b663be87230dd0d7f95a9688b0b0d2e1eb0104eea6dafa04759303a29212e04f9bb4ff4efef9e4af2d4517ca6c23c907b7d5ff03d8520b9245cebd406d13ff38da51fdb0dee0bd0797fe04eb2ee9e", 0xaa, 0x7fff}], 0x44, &(0x7f0000000440)={[{@barrier='barrier'}, {@swalloc='swalloc'}, {@logbufs={'logbufs', 0x3d, 0x1}}, {@uqnoenforce='uqnoenforce'}, {@nobarrier='nobarrier'}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r1}}, {@appraise_type='appraise_type=imasig'}, {@uid_lt={'uid<', 0xee01}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@euid_lt={'euid<', r6}}]}) 06:02:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x129000, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f00000000c0)={0x7d}) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x4, 0x0) 06:02:42 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="9f11c186ef9c8fedc789d904719d4e361824"], 0x12, 0x3) [ 445.779511] FAULT_INJECTION: forcing a failure. [ 445.779511] name failslab, interval 1, probability 0, space 0, times 0 [ 445.799260] CPU: 0 PID: 8750 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 445.807175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.816540] Call Trace: [ 445.819128] dump_stack+0x1b2/0x283 [ 445.822761] should_fail.cold+0x10a/0x154 [ 445.826910] should_failslab+0xd6/0x130 [ 445.830882] kmem_cache_alloc+0x28e/0x3c0 [ 445.835024] __d_alloc+0x2a/0x9b0 [ 445.838467] d_alloc+0x46/0x240 [ 445.841740] __lookup_hash+0x51/0x180 [ 445.845531] filename_create+0x156/0x3f0 [ 445.849583] ? kern_path_mountpoint+0x40/0x40 [ 445.854084] SyS_mkdirat+0x95/0x220 [ 445.857726] ? SyS_mknod+0x30/0x30 [ 445.861259] ? do_syscall_64+0x4c/0x640 [ 445.865222] ? SyS_mkdirat+0x220/0x220 [ 445.869110] do_syscall_64+0x1d5/0x640 [ 445.872993] entry_SYSCALL_64_after_hwframe+0x46/0xbb 06:02:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9e33, 0x200) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000004c0)={0x0, &(0x7f0000000180)=[&(0x7f00000000c0)="653f4b7c131d621912e0cc85a549466a72b2c7a1709d0cf491adaa126fcf381e7378814a27c5ad2a0f3ad397140f2da00ddbf403bd94fa163e4f169243227cfd974665d672fbae2d323df86090e7f7826dc19b6e48f08d50e4dbd8a43f0515510eab20077de0267a5bf90cc0cbaf95ff474ba6141a740f8658a600414f602fa50a9d5a87abd9712a700c8329ba6b", &(0x7f0000000200)="2793f42298daf702b122694a30a9b4b6543bff5dc44984bafc8fb1bea1ff4392e9baf1bff28489540858cd821f16dcc56c5c95ae9f3d65301f47bb7e4146596a37b700c9db885fa26e9c26b7db1c1bb455f2fb3d5c16fd02c498ce71ef04f4db1f698d4a038c297797e46de03271c63d1415e6256816202f2c9ad238a240f866d8eaa419755542901b88fea1e3f1720f", &(0x7f0000000340)="291369846309919509d90a59387c6f329cb3bed38b4121bd03c3ec7819ed02997e5d4bfec6b5dbbd681a1d246edaf9eb8cc2c8538aaf6d61840df4243df5c6c96562a9fbce4ea52021f3304fd6219ac717230765b4e4eeebb65b9768aa8942e6a7dbd767560a1574306b6cb5452d98b4ce43ed306b34f04022f5cd67269894468ffca596bed288c6980ac0fa517fe26d5543f0b528d1", &(0x7f0000000400)="8407929b82906d52b745fbb5bbc75f136eead3dc6fc8a69235c16df40a9f8250d4ee2bb3f20974f407351bb2fbd9bf8bd7ea2da0fd2f0aeed573a6259c53742a4282bb870fb8d54e6738f307462c50e89a528c157fbeb52c0061bcbb7564868256902ee414cad63bdac70752bc8018270591033ff92f0be055cadcd330abb479ac84c3ab08ed9270e77782ef26d02709604e432d86c09007f84da7f2244216ea64a98364b9570c08eedbda34573512abcb7866"]}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, r2, 0x0, 0xff7ffffe) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r4}}, 0x48) lseek(r3, 0x7, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @dev}, {0x2, 0x0, 0xfff7ffc0, @loopback}, r4}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x1, {0x4, 0xd1b5, "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", 0x1f, 0x5, 0xea, 0x6b, 0x4, 0x6, 0x8, 0x1}, r4}}, 0x128) [ 445.878169] RIP: 0033:0x45bfa7 [ 445.881349] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 445.889047] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 445.896303] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 445.903569] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 445.910829] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 445.918091] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0x2, 0x34a, 0x1000, &(0x7f0000000340)="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"}) 06:02:42 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4c04, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x9, 0x8}, 0x183a3, 0xffffffff, 0x1000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000380)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:42 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xc0080, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r2, r3, 0x0, 0xff7ffffe) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x4, 0xa, 0x4, 0x1000, 0x6, {0x77359400}, {0x2, 0xc, 0x81, 0x0, 0x7f, 0x80, "ff8bcc8a"}, 0x101, 0x4, @fd=r1, 0x6, 0x0, r3}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000240)={0x0, r4, 0x8, 0xa5, 0x1ff, 0x100}) r6 = socket(0x1a, 0xa, 0x5) ioctl$sock_SIOCOUTQNSD(r6, 0x894b, &(0x7f0000000140)) 06:02:42 executing program 2: pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x600402, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000380)=0x14) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80000000) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r3, r4, 0x0, 0xff7ffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @in6={0xa, 0x4e23, 0x8, @empty}}}, 0x90) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000080)=""/77, &(0x7f0000000100)=0x4d) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x20008015, &(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x55) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000380)=""/126, 0x7e, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @dev}, {0x2, 0x0, 0xfff7ffc0, @loopback}, r4}}, 0x48) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r5, 0x80006) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r5}}, 0x18) [ 446.075743] FAULT_INJECTION: forcing a failure. [ 446.075743] name failslab, interval 1, probability 0, space 0, times 0 [ 446.117164] print_req_error: 33 callbacks suppressed [ 446.117169] print_req_error: I/O error, dev loop5, sector 0 06:02:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3aa44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000480)="5a6031a27a5a6b58cd60417e7b241366055819432ca410e8847da6306bab76a3af4f461c31e8cdea01fea59c0215debf9f83b39a66c1d115d3b19d3aeba282664db67a9abc60fd3a460b097b8f04d2ed6dbdcff74ab41228eca2af8b1f7dea13c53761c446b9379b6771d7ba7db21d0e537b10de987160a3c2bb8203017a62ce2164344f212b55da", 0x88}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000200)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 446.158139] print_req_error: I/O error, dev loop5, sector 0 [ 446.163885] buffer_io_error: 28 callbacks suppressed [ 446.163890] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.181392] print_req_error: I/O error, dev loop5, sector 0 [ 446.187230] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.199438] print_req_error: I/O error, dev loop5, sector 0 [ 446.205185] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.217957] CPU: 1 PID: 8788 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 446.222843] print_req_error: I/O error, dev loop5, sector 0 [ 446.225743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.225748] Call Trace: [ 446.225767] dump_stack+0x1b2/0x283 [ 446.225784] should_fail.cold+0x10a/0x154 [ 446.225797] should_failslab+0xd6/0x130 06:02:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$char_usb(0xffffffffffffffff, &(0x7f0000000600)=""/84, 0xfffffffffffffde9) r2 = socket(0x11, 0x800000003, 0x8) r3 = socket(0x11, 0x800000003, 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000540)='r\x00ME{>\xa2-\xce\x8f\x1d3\r]\x17)\x8b\b\xa9\x8a\x804\x9eI\x1a\x05k\x9c\'6\x83\x17\xe4T\x01\xc2\x9ei(#\xc8+!b(y\xa3=!\xc6\x92\x14\xbfO\xbf\x8es@\xfe\x92\x8f', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendto$netrom(r3, &(0x7f0000000340)="b0fe595e916dcb686b663767fec63c475b89415d5dcfb28402209ffa8f24f208892694b53dac8ea2dd03ce481dfecbb36ff649db535b1b944eeaede7fb618771af837ebd26108b712f5a46871d84da4f6e8fd1b6fbd07c6a33a37228114b0546b5e0a5a5cf564e56e560a695fbfce1d7e1c1cd6b4576376af841d643e51f043d00cc216294c717a85447f2ef01b09e4ad5e323424d423628947d4ee49f83993042975c5302b1027171b147e336e0a35652d6f79c150639c1776886dc5204a8241bcebb1df24e9bab4d1c3301c69f792219b0e7c6c678f512024b0a3c3a5ba6f1ea46ce3a3c3d749d11bbcc5bbd7df293348e", 0xf2, 0x40010, &(0x7f0000000200)={{0x3, @null, 0x5}, [@null, @bcast, @null, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000440)={'filter\x00', 0x7d, "5a6c3184cab0c3fc530ff5f31ccc75af2d3b74d4f6b3d5c3e6595104e9ce65664885adcfb0207699dff0c0300fbe9feb7057fc81e9f17c6ee6accf90edf4c10312c94eeece31fca9bed71b4bdd8c30046bb37513f9fd336f9997e4065e78bedc2b8540219e3b0c636e9c57d3e1e3bac17b60d5677b61b75ede884b9fe9"}, &(0x7f0000000500)=0xa1) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x1f}], 0x9000c, 0x0) [ 446.231517] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.240817] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 446.240828] ? kobject_create_and_add.cold+0x3f/0x3f [ 446.240839] call_usermodehelper_setup+0x73/0x2e0 [ 446.240850] kobject_uevent_env+0xa79/0xc50 [ 446.247841] print_req_error: I/O error, dev loop5, sector 0 [ 446.251153] lo_ioctl+0x1177/0x1c00 [ 446.251166] ? loop_clr_fd+0xac0/0xac0 [ 446.251178] blkdev_ioctl+0x91d/0x17c0 [ 446.251187] ? blkpg_ioctl+0x8d0/0x8d0 [ 446.251194] ? trace_hardirqs_on+0x10/0x10 06:02:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="1a614beab760000036c64b2f76923aa4741ca6dd052100000000ffff2e41bac8d1e83ecf8c0d0879d38efc06850000ffffffe95eafc2ca385c5d3a1a18b3bc6228e89af081643a5badc9e00063ec3ef57dc756e0db2b26124c377f2f454dd475ac5b642dbf656838d6652dd00c17a26d186573a05f768cb9e8a1dc970553bfa4374ed5989a263c6966a8c8daf9cd2dddc063d85c1108c05e3f8fa4a0c2a3f1ae4d8dc0e3d8630a8afb8ecb74"]}) r2 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xd490010}, 0xc, &(0x7f0000000600)={&(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESOCT=r2, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4c051}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f00000006c0)={0x14, r2, 0x20, 0x70bd25, 0x25dfdbff}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x8004) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xe0, r2, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x52a}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xd}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x21}}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x81}, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) sendmsg$inet(r0, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000640)="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", 0x11c}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124d9b6d356d36cce272ad7f0bde5db347f6f7c713b0b761796d19951301d9fda2c2b7d0100000000000000e7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000240)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="2002c7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed9500000000", 0x47}], 0xa, &(0x7f0000001840)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8178}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r2, 0x80006) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 446.251212] block_ioctl+0xd9/0x120 [ 446.255147] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.262214] ? blkdev_fallocate+0x3a0/0x3a0 [ 446.262224] do_vfs_ioctl+0x75a/0xfe0 [ 446.262235] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 446.269354] print_req_error: I/O error, dev loop5, sector 0 [ 446.272050] ? ioctl_preallocate+0x1a0/0x1a0 [ 446.272070] ? security_file_ioctl+0x76/0xb0 [ 446.272077] ? security_file_ioctl+0x83/0xb0 [ 446.272086] SyS_ioctl+0x7f/0xb0 [ 446.276898] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.281191] ? do_vfs_ioctl+0xfe0/0xfe0 [ 446.281203] do_syscall_64+0x1d5/0x640 [ 446.281217] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 446.281226] RIP: 0033:0x45c9f7 [ 446.287343] print_req_error: I/O error, dev loop5, sector 24 [ 446.290499] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.290509] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045c9f7 [ 446.290513] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 446.290519] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 446.290524] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 446.290529] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 446.428074] Buffer I/O error on dev loop5, logical block 3, async page read [ 446.432131] print_req_error: I/O error, dev loop4, sector 0 [ 446.444914] print_req_error: I/O error, dev loop5, sector 0 [ 446.450924] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.458390] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.465853] Buffer I/O error on dev loop5, logical block 0, async page read [ 446.496001] BTRFS error (device loop5): superblock checksum mismatch 06:02:43 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000080000000d0001006d61746368616c6c0000000004000100c5c3cd7ab84f85ca7bd2f14959dcedf9010000004895dc91943dbfd3b1c5ae5e9c9e640376f4302d2ab4bdf310c1fcd28965e900b0353cc6d8cca4ee9a3c87b6297bbed9d3499dec7015ca996b5f76"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929}, 0x24}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, r2, 0x0, 0xff7ffffe) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r4, 0x80006) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x48, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x1}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}]}, 0x48}, 0x1, 0x0, 0x0, 0x4008000}, 0x8800) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r5, 0x0, 0xff7ffffe) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 446.530817] BTRFS error (device loop5): open_ctree failed 06:02:43 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 446.637276] FAULT_INJECTION: forcing a failure. [ 446.637276] name failslab, interval 1, probability 0, space 0, times 0 [ 446.649122] CPU: 0 PID: 8845 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 446.656915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.666261] Call Trace: [ 446.668845] dump_stack+0x1b2/0x283 [ 446.672555] should_fail.cold+0x10a/0x154 [ 446.676689] should_failslab+0xd6/0x130 [ 446.680651] kmem_cache_alloc+0x28e/0x3c0 [ 446.684792] selinux_inode_alloc_security+0xb1/0x2a0 [ 446.689887] security_inode_alloc+0x8f/0xd0 [ 446.694200] inode_init_always+0x576/0xb10 [ 446.698435] alloc_inode+0x7a/0x170 [ 446.702071] new_inode_pseudo+0x14/0xe0 [ 446.706035] new_inode+0x1b/0x40 [ 446.709388] __ext4_new_inode+0x356/0x4e80 [ 446.713616] ? ext4_free_inode+0x14a0/0x14a0 [ 446.718020] ? avc_has_perm+0x1a4/0x320 [ 446.721980] ? __dquot_initialize+0x3f4/0x980 [ 446.726536] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 446.731181] ? inode_get_rsv_space.part.0+0x100/0x100 [ 446.736345] ? security_transition_sid+0xcb/0x120 [ 446.741171] ? security_transition_sid+0x9d/0x120 [ 446.745998] ext4_mkdir+0x2e4/0xb60 [ 446.749611] ? selinux_dentry_init_security+0x220/0x220 [ 446.754957] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 446.759611] ? security_inode_mkdir+0xcc/0x100 [ 446.764169] vfs_mkdir+0x3af/0x620 [ 446.767681] SyS_mkdirat+0x1b5/0x220 [ 446.771368] ? SyS_mknod+0x30/0x30 [ 446.774878] ? do_syscall_64+0x4c/0x640 [ 446.778822] ? SyS_mkdirat+0x220/0x220 [ 446.782687] do_syscall_64+0x1d5/0x640 [ 446.786551] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 446.791707] RIP: 0033:0x45bfa7 [ 446.794868] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 446.802542] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 446.809789] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 446.817041] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 446.824360] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 06:02:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_read_part_table(0x2, 0x5, &(0x7f0000000440)=[{&(0x7f0000000080)="9a13fd5228430b413a242df7ea483e9a62283a7e13e153fe4b8e4d65b87e8fdf51b38bd423941a5509be458a9463192d8df963346d5fa86eb78f37c975faeeaa449cbc1ba23f8bed73532ad07d6bf5364638d1a0c94295aa5bdecad5fc160aa4a900aefc62ac789f70c9fdf66dbb93a55ea49cc9a651ed72a5342aa3adf8e7062c66cf8431d37d64", 0x88, 0x2}, {&(0x7f0000000200)="9dcbda144d113cd8a78f64b509a808f47b02ba891c6c0212e3ce7b74ccaaf1d83417cd4a323ef120527f37badcfade2cd0a0e365e93aac5f5cb5a9ef75aec50b6099f42fe57ce4d6d10ab319dc09783498cf2565260d233bebcac6c3fa5c09416c49bf21b75356e0ccc8340dca26f58a04e2aa279cfe033ac6a9b91b2e60fa61ca7a20644c8aaff686d1ae21d8cd28f303ce87b8f9b1eb4f", 0x98, 0x7}, {&(0x7f0000000140)="1766d61ac8c6bd3fc2c69a890e5ac47175a1cf2b3f5a949436c5fc87002667abda716800459d983fc7c37da7d692d6421de74643c1da3cfbf583a9431f23d47d54e27105e80629e45d1bfd7ea2a8e7", 0x4f, 0xffffffffffff0001}, {&(0x7f0000000340)="e6f042ca8b5aff235a7c", 0xa, 0xd0}, {&(0x7f0000000380)="03743d0c1c2f76eb5568d20a4e9651eb8d827c821d19e797cf54702c3e10565d77a8568a1962a559555a2d5127e812be6a689944d6886121e83f79839ba8a0820c88d052e6dfd8ac1b33094c2577c5d5a04dc8b265804f502ac276fa9d3ba4cd717b54321b168ff493f7cf5cea4ebc579f7dcaa9756c1e2c2c91e7bc3637b99e5c1addc425bb1b0cafb815eff67827ef65c1a4f99bdd4bb2d65634b77a635f49", 0xa0, 0x4}]) 06:02:43 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x101, 0x0) [ 446.831602] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:43 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000200)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r2, 0x0, 0xff7ffffe) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000080)={0x9f, 0x1, 0x2, {0x3, @pix_mp={0xbee9, 0x101, 0x4f424752, 0x6, 0x3, [{0x5, 0xfffffff9}, {0x8, 0x25db}, {0x7ff, 0x2}, {0x6c0143da, 0x10001}, {0x1, 0x1}, {0x77, 0x7}, {0x800, 0x5}, {0x4, 0xff}], 0x8, 0x1, 0x1, 0x1, 0x3}}, 0x9}) 06:02:43 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x4000, 0x0) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff11004dd4b002000000000000007a000000ff000000009748aeb81e1b00b10efd9a0000015266535f4d", 0x36, 0x10000}], 0x0, 0x0) 06:02:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000180)='bbr\x00', 0x1) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x14, r1, 0x536ae464467e3e0b, 0x0, 0x0, {0x21}}, 0x14}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r2, r3, 0x0, 0xff7ffffe) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000000c0)=0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r1, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r6}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x4004801) [ 447.003705] FAULT_INJECTION: forcing a failure. [ 447.003705] name failslab, interval 1, probability 0, space 0, times 0 [ 447.033599] CPU: 1 PID: 8865 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 447.041407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.050754] Call Trace: [ 447.053323] dump_stack+0x1b2/0x283 [ 447.056939] should_fail.cold+0x10a/0x154 [ 447.061096] should_failslab+0xd6/0x130 [ 447.065069] kmem_cache_alloc+0x28e/0x3c0 [ 447.069213] ? ext4_sync_fs+0x7e0/0x7e0 [ 447.073180] ext4_alloc_inode+0x19/0x610 [ 447.077231] ? ext4_sync_fs+0x7e0/0x7e0 [ 447.081194] alloc_inode+0x5d/0x170 [ 447.084811] new_inode_pseudo+0x14/0xe0 [ 447.088772] new_inode+0x1b/0x40 [ 447.092128] __ext4_new_inode+0x356/0x4e80 [ 447.096349] ? ext4_free_inode+0x14a0/0x14a0 [ 447.100726] ? avc_has_perm+0x1a4/0x320 [ 447.104671] ? __dquot_initialize+0x3f4/0x980 [ 447.109142] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 447.113779] ? inode_get_rsv_space.part.0+0x100/0x100 [ 447.118940] ? security_transition_sid+0xcb/0x120 [ 447.123753] ? security_transition_sid+0x9d/0x120 [ 447.128571] ext4_mkdir+0x2e4/0xb60 [ 447.132169] ? selinux_dentry_init_security+0x220/0x220 [ 447.137503] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 447.142146] ? security_inode_mkdir+0xcc/0x100 [ 447.146699] vfs_mkdir+0x3af/0x620 [ 447.150213] SyS_mkdirat+0x1b5/0x220 [ 447.153896] ? SyS_mknod+0x30/0x30 [ 447.157404] ? do_syscall_64+0x4c/0x640 [ 447.161353] ? SyS_mkdirat+0x220/0x220 [ 447.165220] do_syscall_64+0x1d5/0x640 [ 447.169114] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 447.174272] RIP: 0033:0x45bfa7 [ 447.177432] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 447.185113] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 447.192476] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 06:02:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000000)='wg2\x00', 0x4) [ 447.199743] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 447.207095] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 447.214334] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:44 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000200)=0x2, 0x4) 06:02:44 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x114000, 0x0) 06:02:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=r2) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000657468000000000000000000000000000000ed46642dac6c1b603ecae24b5a238dd8acca4bae9002691ac8ed82f27baee9f895a7f92bbbdf83b21fc03ac34dad4260aa299de4da0a4eb824b2ec0af94f1ebedb870c251a0fc2c9fae68ad5d3d9a3e12ab793fd4685f9068d3589090ca66289b2a405686ee0b2f11cebe83c5b0c0f53dc93017551e6beec6ab4ff9fca0d7a0fda9dbd"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="240000002e00298900"/20, @ANYRES32=r8, @ANYBLOB="00f000100000000000000000"], 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wg1\x00', r8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 447.412943] FAULT_INJECTION: forcing a failure. [ 447.412943] name failslab, interval 1, probability 0, space 0, times 0 [ 447.424491] CPU: 1 PID: 8901 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 447.430060] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 447.432372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.432376] Call Trace: [ 447.432392] dump_stack+0x1b2/0x283 [ 447.432408] should_fail.cold+0x10a/0x154 [ 447.460710] should_failslab+0xd6/0x130 [ 447.464679] __kmalloc+0x6d/0x400 [ 447.468114] ? context_struct_to_string+0x323/0x610 [ 447.473117] context_struct_to_string+0x323/0x610 [ 447.477939] ? dump_masked_av_helper+0x90/0x90 [ 447.482493] ? sidtab_search_core+0x17f/0x2a0 [ 447.486960] security_sid_to_context_core+0x187/0x200 [ 447.492124] selinux_inode_init_security+0x45a/0x680 [ 447.497201] ? ext4_get_acl+0xcb/0x500 [ 447.501066] ? selinux_inode_create+0x30/0x30 [ 447.505535] ? ext4_get_acl+0xd0/0x500 [ 447.509402] security_inode_init_security+0x15f/0x320 [ 447.514567] ? ext4_init_acl+0x190/0x190 [ 447.518602] ? security_kernel_post_read_file+0xd0/0xd0 [ 447.523963] ? insert_inode_locked+0x39e/0x4b0 [ 447.528521] __ext4_new_inode+0x35ed/0x4e80 [ 447.532824] ? ext4_free_inode+0x14a0/0x14a0 [ 447.537204] ? avc_has_perm+0x1a4/0x320 [ 447.541154] ? __dquot_initialize+0x3f4/0x980 [ 447.545625] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 447.550272] ? inode_get_rsv_space.part.0+0x100/0x100 [ 447.555436] ? security_transition_sid+0xcb/0x120 [ 447.565306] ? security_transition_sid+0x9d/0x120 [ 447.570127] ext4_mkdir+0x2e4/0xb60 [ 447.573729] ? selinux_dentry_init_security+0x220/0x220 [ 447.579068] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 447.583714] ? security_inode_mkdir+0xcc/0x100 [ 447.588271] vfs_mkdir+0x3af/0x620 [ 447.591787] SyS_mkdirat+0x1b5/0x220 [ 447.595479] ? SyS_mknod+0x30/0x30 [ 447.598998] ? do_syscall_64+0x4c/0x640 [ 447.602958] ? SyS_mkdirat+0x220/0x220 [ 447.606821] do_syscall_64+0x1d5/0x640 [ 447.610685] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 447.615949] RIP: 0033:0x45bfa7 [ 447.619116] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 447.626798] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 447.634041] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 447.641280] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 447.648542] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 447.655784] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="cda4363ac0ed02000af9fdffff01000400b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000200000008000000f60000005f42485266535f4d", 0x48, 0xfffc}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x101240, 0x102) 06:02:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="020f00001400000000000000000000eb04000600000000000a000000000091000000000000000000000000000000000000000000000000000000000000000200000000000000000006000000000000000000000000000000fe8800000000000000000000000000010000010000000000000000c0336690290000000005000500000000000ac51bc26e749e356ada270f00000000da38dff00d9a94f6b70c000000fe88000000000000000000b06e003042aee1041524fb0797fffb6af2f7710c208d6aa6"], 0xa0}}, 0x0) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1008030, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@fscache='fscache'}, {@aname={'aname', 0x3d, '\\,}'}}, {@access_uid={'access', 0x3d, r1}}, {@aname={'aname', 0x3d, 'btrfs\x00'}}, {@access_user='access=user'}], [{@smackfsroot={'smackfsroot', 0x3d, 'btrfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x62, 0x66, 0x34, 0x30, 0x30, 0x36, 0x38], 0x2d, [0x31, 0x63, 0x62, 0x33], 0x2d, [0x34, 0x34, 0x38, 0x65], 0x2d, [0x61, 0x0, 0x35, 0x30], 0x2d, [0x62, 0x39, 0x31, 0x33, 0x31, 0x36, 0x31, 0x63]}}}, {@subj_user={'subj_user', 0x3d, '!.'}}]}}) 06:02:44 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:44 executing program 3: r0 = semget(0x3, 0x1, 0x600) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0x0, r2, 0x0, 0x44, 0x1003}, 0x4, 0x4100000001, 0x0, 0x0, 0x0, 0x0, 0x2}) semctl$GETNCNT(r0, 0x4, 0xe, &(0x7f0000000080)=""/10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x41c1, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x64010100}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000240)="8dc34730da5d3856ac356333fe296ea511e93cabfa8b22ca78a8aa93ebc243d867024320e683c34490788abe845cf46439164a7acb618a96a6f780d0b6fe9102815d7d1fb8b896e407708f94e23d7efdb329668215c4567a5432c4b1758844dcc3f39286bf488d0300bb550b17526afae48847243c", 0x75}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 447.783318] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 447.841746] FAULT_INJECTION: forcing a failure. [ 447.841746] name failslab, interval 1, probability 0, space 0, times 0 [ 447.853151] CPU: 0 PID: 8929 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 447.860935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.870279] Call Trace: [ 447.872860] dump_stack+0x1b2/0x283 [ 447.876485] should_fail.cold+0x10a/0x154 [ 447.880654] should_failslab+0xd6/0x130 [ 447.884623] __kmalloc+0x6d/0x400 [ 447.888067] ? context_struct_to_string+0x323/0x610 [ 447.893077] context_struct_to_string+0x323/0x610 [ 447.897925] ? dump_masked_av_helper+0x90/0x90 [ 447.902499] ? sidtab_search_core+0x17f/0x2a0 [ 447.906993] security_sid_to_context_core+0x187/0x200 [ 447.912183] selinux_inode_init_security+0x45a/0x680 [ 447.917277] ? ext4_get_acl+0xcb/0x500 [ 447.921157] ? selinux_inode_create+0x30/0x30 [ 447.925644] ? ext4_get_acl+0xd0/0x500 [ 447.929518] security_inode_init_security+0x15f/0x320 [ 447.934681] ? ext4_init_acl+0x190/0x190 [ 447.938732] ? security_kernel_post_read_file+0xd0/0xd0 [ 447.944085] ? insert_inode_locked+0x39e/0x4b0 [ 447.948641] __ext4_new_inode+0x35ed/0x4e80 [ 447.952941] ? ext4_free_inode+0x14a0/0x14a0 [ 447.957324] ? avc_has_perm+0x1a4/0x320 [ 447.961271] ? __dquot_initialize+0x3f4/0x980 [ 447.965734] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 447.970377] ? inode_get_rsv_space.part.0+0x100/0x100 [ 447.975538] ? security_transition_sid+0xcb/0x120 [ 447.980353] ? security_transition_sid+0x9d/0x120 [ 447.985173] ext4_mkdir+0x2e4/0xb60 [ 447.988781] ? selinux_dentry_init_security+0x220/0x220 [ 447.994119] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 447.998781] ? security_inode_mkdir+0xcc/0x100 [ 448.003338] vfs_mkdir+0x3af/0x620 [ 448.006859] SyS_mkdirat+0x1b5/0x220 [ 448.010567] ? SyS_mknod+0x30/0x30 [ 448.014085] ? do_syscall_64+0x4c/0x640 [ 448.018041] ? SyS_mkdirat+0x220/0x220 [ 448.021908] do_syscall_64+0x1d5/0x640 [ 448.025776] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 448.030939] RIP: 0033:0x45bfa7 [ 448.034103] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 06:02:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x3, 0x8, 0x10001, 0xffff, 0x9, "4ce85af71f702822e57ce5fcc57b7629becb75"}) 06:02:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r3 = fcntl$dupfd(r1, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r4 = socket(0x11, 0x800000003, 0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r5, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r6 = gettid() ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000080)=r6) r7 = syz_open_procfs(r6, &(0x7f00000000c0)='fdinfo/4\x00') finit_module(r7, &(0x7f0000000500)='\"\xcd^\x00\x8eA\x1c\x15\xb6\x86p\x10\xec#\xb5^\xde\xc4|\xbb\xb6\x0fm\x10\xf1\x93\x9a\x9dE\xf1\x89Y\xa0S\x9d\xdbMI(\x17V\xb4\xcd\xdc\x9f\x02\xb5\x8b\x06_%>=6P,\xec\x97\xf7\x9dd\b\xaa\x10C{\xb6\xef8p\x18\x06\x82\x00d\xae\xc2|\x8b\xc0T\xe7\xa1\xb6\xb2y}s\xcf\x9d\xe2(\xd6\xd4\\\xec\"\xc4C\xddkW\x9d\xa8\xf1j\r\xaf/A\x82f\x84\x96\xf8\xb5\x84\xfe\xdc\a\x91Jq\xf9\xdfw\xd9q\x8d\xfa(\x1f\x8d\xa1\xd6\xc4\xe9\t\xa6\xd2\x92R\a\xc8\xee\\\xe5\xba\x94\xb7\x8b\xa7w5ll\xe8\xbb\xd6\x98\xb4,a\x1b\x06V\x00cj\x0e\xa7\x1e\xf51\xee\xbd\xdd\x9dd\x89\xaa\x9c', 0x3) bind(r4, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) 06:02:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3b, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000001e18000000000000000000000000000000000000c50bf14980d0f16b000000f2"]) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)={{0x0, 0x0, 0x80}, "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", "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 448.041794] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 448.049051] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 448.056295] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 448.063537] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 448.070780] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:44 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 448.189151] FAULT_INJECTION: forcing a failure. [ 448.189151] name failslab, interval 1, probability 0, space 0, times 0 [ 448.204308] CPU: 1 PID: 8957 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 448.212110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.221439] Call Trace: [ 448.224008] dump_stack+0x1b2/0x283 [ 448.227613] should_fail.cold+0x10a/0x154 [ 448.231739] should_failslab+0xd6/0x130 [ 448.235697] __kmalloc+0x2c1/0x400 [ 448.239213] ? ext4_find_extent+0x772/0x9f0 [ 448.243514] ext4_find_extent+0x772/0x9f0 [ 448.247637] ext4_ext_map_blocks+0x16f/0x4b30 [ 448.252126] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 448.257113] ? ext4_es_lookup_extent+0x321/0xac0 [ 448.261852] ? lock_acquire+0x170/0x3f0 [ 448.265801] ? lock_acquire+0x170/0x3f0 [ 448.269767] ? ext4_map_blocks+0x3c7/0x1600 [ 448.274074] ext4_map_blocks+0xc8f/0x1600 [ 448.278199] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 448.283623] ? ext4_issue_zeroout+0x150/0x150 [ 448.288089] ? __ext4_new_inode+0x278/0x4e80 [ 448.292473] ext4_getblk+0x98/0x3f0 [ 448.296071] ? ext4_iomap_begin+0x7f0/0x7f0 [ 448.300369] ? __dquot_initialize+0x3f4/0x980 [ 448.304840] ext4_bread+0x6c/0x1a0 [ 448.308353] ? ext4_getblk+0x3f0/0x3f0 [ 448.312214] ? inode_get_rsv_space.part.0+0x100/0x100 [ 448.317399] ? security_transition_sid+0xcb/0x120 [ 448.322214] ? security_transition_sid+0x9d/0x120 [ 448.327040] ext4_append+0x143/0x350 [ 448.330730] ext4_mkdir+0x4c9/0xb60 [ 448.334334] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 448.338989] ? security_inode_mkdir+0xcc/0x100 [ 448.343544] vfs_mkdir+0x3af/0x620 [ 448.347062] SyS_mkdirat+0x1b5/0x220 [ 448.350751] ? SyS_mknod+0x30/0x30 [ 448.354268] ? do_syscall_64+0x4c/0x640 [ 448.358213] ? SyS_mkdirat+0x220/0x220 [ 448.362078] do_syscall_64+0x1d5/0x640 [ 448.365943] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 448.371105] RIP: 0033:0x45bfa7 [ 448.374266] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 448.381945] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 448.389184] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 448.396434] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 448.403684] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 448.410931] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080), &(0x7f0000000100)=0x4) 06:02:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xfffffffffffffdea}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) dup(r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x1c, r1, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 448.510941] BTRFS error (device loop5): superblock checksum mismatch [ 448.598385] BTRFS error (device loop5): open_ctree failed 06:02:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000140)=0x9) waitid$P_PIDFD(0x3, r1, &(0x7f0000000200), 0x8, &(0x7f0000000340)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r3 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x43) ftruncate(r2, 0x80006) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000080)) socket$inet_smc(0x2b, 0x1, 0x0) 06:02:45 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 448.730844] FAULT_INJECTION: forcing a failure. [ 448.730844] name failslab, interval 1, probability 0, space 0, times 0 [ 448.742160] CPU: 0 PID: 9012 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 448.749939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.759266] Call Trace: [ 448.761833] dump_stack+0x1b2/0x283 [ 448.765439] should_fail.cold+0x10a/0x154 [ 448.769563] should_failslab+0xd6/0x130 [ 448.773508] kmem_cache_alloc+0x40/0x3c0 [ 448.777544] __es_insert_extent+0x241/0xe20 [ 448.781840] ext4_es_insert_extent+0x1b9/0x530 [ 448.786395] ? lock_downgrade+0x6e0/0x6e0 [ 448.790532] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 448.796302] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 448.801728] ? rcu_read_lock_sched_held+0x10a/0x130 [ 448.806716] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 448.812485] ext4_ext_put_gap_in_cache+0xbb/0xf0 [ 448.817212] ? ext4_zeroout_es+0x160/0x160 [ 448.821419] ? ext4_find_extent+0x66a/0x9f0 [ 448.825714] ext4_ext_map_blocks+0x1bbf/0x4b30 [ 448.830288] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 448.835272] ? ext4_es_lookup_extent+0x321/0xac0 [ 448.839998] ? lock_acquire+0x170/0x3f0 [ 448.843949] ? lock_acquire+0x170/0x3f0 [ 448.847899] ? ext4_map_blocks+0x3c7/0x1600 [ 448.852196] ext4_map_blocks+0xc8f/0x1600 [ 448.856319] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 448.861745] ? ext4_issue_zeroout+0x150/0x150 [ 448.866211] ? __ext4_new_inode+0x278/0x4e80 [ 448.870598] ext4_getblk+0x98/0x3f0 [ 448.874200] ? ext4_iomap_begin+0x7f0/0x7f0 [ 448.878494] ? __dquot_initialize+0x3f4/0x980 [ 448.882962] ext4_bread+0x6c/0x1a0 [ 448.886483] ? ext4_getblk+0x3f0/0x3f0 [ 448.890340] ? inode_get_rsv_space.part.0+0x100/0x100 [ 448.895504] ? security_transition_sid+0xcb/0x120 [ 448.900317] ? security_transition_sid+0x9d/0x120 [ 448.905131] ext4_append+0x143/0x350 [ 448.908819] ext4_mkdir+0x4c9/0xb60 [ 448.912422] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 448.917067] ? security_inode_mkdir+0xcc/0x100 [ 448.921623] vfs_mkdir+0x3af/0x620 [ 448.925138] SyS_mkdirat+0x1b5/0x220 [ 448.928827] ? SyS_mknod+0x30/0x30 [ 448.932340] ? do_syscall_64+0x4c/0x640 [ 448.936285] ? SyS_mkdirat+0x220/0x220 [ 448.940143] do_syscall_64+0x1d5/0x640 [ 448.944005] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 448.949167] RIP: 0033:0x45bfa7 [ 448.952328] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 448.960010] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 448.967267] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 448.974523] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 06:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendto$unix(r0, &(0x7f0000000480)="0516e0c886d586f690dd89728117897abedcdaaeb1bd1ccd5c23a79e8cb9b1cdcbd778ddd846c6b5fb608b2a1dd59c13fa30bac1b00c2e581dde3d084e616d0ede7d53b1828e6792f6fb591a11f6d3bea64faeb646ad623dc3bf531047f1fedecba5297d15e91206cd97e1a7549db15ce21afd32f04cf3f028b3de5dd2abfe665d1f844a8d891715655ee274795c7ec7b56eecd81681e420155506ae12e327af8569469c1d4a6b850a0054c8aee76fcc9e81572ca24f9834613d0b1f375beb10226c91de108b63eb32459767ce08b0a00b6dbf16055e22da0f234fa986f67d2df7209e02f35f3466ed2670f4789d6e49", 0xf0, 0xc804, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 06:02:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001800dd8d00000000e3ffffff020000000000fe02000000001400090008000000", @ANYRES32=0x0, @ANYBLOB='\b'], 0x30}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) recvmmsg(r1, &(0x7f0000001d40)=[{{&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)=""/142, 0x8e}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000340)=""/201, 0xc9}, {&(0x7f0000000440)=""/106, 0x6a}], 0x4, &(0x7f00000004c0)=""/137, 0x89}, 0x5}, {{&(0x7f0000000580)=@generic, 0x80, &(0x7f0000000640)=[{&(0x7f0000000600)=""/49, 0x31}], 0x1}, 0xa3d6}, {{&(0x7f0000000680)=@alg, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/11, 0xb}, {&(0x7f0000000740)=""/75, 0x4b}], 0x2, &(0x7f0000000800)=""/213, 0xd5}, 0xfffffffd}, {{&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000980)=""/117, 0x75}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/128, 0x80}, {&(0x7f0000001a80)=""/240, 0xf0}, {&(0x7f0000001b80)=""/163, 0xa3}, {&(0x7f0000001c40)=""/26, 0x1a}], 0x6, &(0x7f0000001d00)=""/23, 0x17}, 0x3}], 0x4, 0x20, &(0x7f0000001e40)={0x77359400}) sendmsg$nl_route_sched(r0, &(0x7f0000001f00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e80)=@delchain={0x2c, 0x65, 0x70c, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xfff1, 0xffe0}, {0xffff, 0x2}, {0x2, 0xfff1}}, [@TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x8084) [ 448.981767] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 448.989025] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="020f00001400000000000000000000eb04000600000000000a000000000091000000000000000000000000000000000000000000000000000000000000000200000000000000000006000000000000000000000000000000fe8800000000000000000000000000010000010000000000000000c0336690290000000005000500000000000ac51bc26e749e356ada270f00000000da38dff00d9a94f6b70c000000fe88000000000000000000b06e003042aee1041524fb0797fffb6af2f7710c208d6aa6"], 0xa0}}, 0x0) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1008030, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@fscache='fscache'}, {@aname={'aname', 0x3d, '\\,}'}}, {@access_uid={'access', 0x3d, r1}}, {@aname={'aname', 0x3d, 'btrfs\x00'}}, {@access_user='access=user'}], [{@smackfsroot={'smackfsroot', 0x3d, 'btrfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x62, 0x66, 0x34, 0x30, 0x30, 0x36, 0x38], 0x2d, [0x31, 0x63, 0x62, 0x33], 0x2d, [0x34, 0x34, 0x38, 0x65], 0x2d, [0x61, 0x0, 0x35, 0x30], 0x2d, [0x62, 0x39, 0x31, 0x33, 0x31, 0x36, 0x31, 0x63]}}}, {@subj_user={'subj_user', 0x3d, '!.'}}]}}) 06:02:45 executing program 3: symlink(&(0x7f0000000100)='./file1/file0\x00', &(0x7f00000000c0)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 449.058973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=9021 comm=syz-executor.1 [ 449.088834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=9028 comm=syz-executor.1 06:02:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x1) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00dev/cec#\x00'], &(0x7f0000000180)=""/87, 0x57) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r3, 0x80006) r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x1) r5 = fcntl$dupfd(r1, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r5, 0x401070c9, &(0x7f0000000040)={0x4, 0x7ff}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x20003, 0x0, &(0x7f0000000040), 0x1150012, 0x0) 06:02:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x2, 0x9a}]}, 0xc, 0x1) 06:02:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x7f, 0xfce, 0x3, 0x200, 0x24fa, 0xff5}) r1 = openat(r0, &(0x7f0000000240)='./bus\x00', 0x2000, 0xa2) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000280)=0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000100)={0x3, 0x0, [{0x5, 0x2, 0x0, 0x0, @irqchip={0x1, 0x8cd}}, {0x6, 0x1, 0x0, 0x0, @msi={0x7fff, 0x9, 0x81, 0x8}}, {0x2, 0x2, 0x0, 0x0, @adapter={0x5, 0x1, 0x2, 0x2, 0x10001}}]}) [ 449.184952] BTRFS error (device loop5): superblock checksum mismatch 06:02:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x3, 0x118800) 06:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) 06:02:46 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x3, 0x1, 0x3f, 0x3, 0x9}}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 449.268063] BTRFS error (device loop5): open_ctree failed 06:02:46 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x88020, 0x0) clone(0x8000000, &(0x7f0000000040)="ec0d61035c092124557f83f7c2f9745eaf76ded0b42e9932787c2515a6458ddbf740c6bc1b207d1d0f65ca4dc270af9bbc989e7767d161730d51df96702585dd347c29756347669b7b210e0cc516cf2336d49ada7ac9f068667079a223d17eaddb5eed55529aef64bd8856356bf18f2dbbf313be87309221f2af5705c984c278f41b46e3352540487d725d2590ba0832003ad4", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000200)="df3a82f93f448e103d5653ca1f6c734976b541080fbfc41966a35341f8ba0eb6826bb58267f49a3c8c6e12baf77c12a6c6a0ba620e6a6f77ebd27a365c5996d1d479169fdba9e12a7f1348cec748afbba3ac64b8bd2d8fa9e9ce18e890e91671761b7387306c8c1b278a069a3988efe57f07236db6f96379b83aab8fc47f18ee93a6df773f9656deef076533e8bb5b35890cba00ed1da4f816f61042e93f33f9271d901497570d5bf9b62bf7ca837f476422e9ad43e36232fcfb5ddf13a6081dd3d1dfbf4ec89e3b70f77e16301dd4fd2e76638f8cc892b8f0d109729fca82243d732cea0cb8dcdf") [ 449.417349] FAULT_INJECTION: forcing a failure. [ 449.417349] name failslab, interval 1, probability 0, space 0, times 0 [ 449.428793] CPU: 0 PID: 9074 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 449.436581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.445923] Call Trace: [ 449.448503] dump_stack+0x1b2/0x283 [ 449.452126] should_fail.cold+0x10a/0x154 [ 449.456265] should_failslab+0xd6/0x130 [ 449.460229] kmem_cache_alloc+0x40/0x3c0 [ 449.464285] __es_insert_extent+0x241/0xe20 [ 449.468603] ext4_es_insert_extent+0x1b9/0x530 [ 449.473178] ? lock_downgrade+0x6e0/0x6e0 [ 449.477316] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 449.483134] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 449.488574] ? rcu_read_lock_sched_held+0x10a/0x130 [ 449.493587] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 449.499376] ext4_ext_put_gap_in_cache+0xbb/0xf0 [ 449.504119] ? ext4_zeroout_es+0x160/0x160 [ 449.508342] ? ext4_find_extent+0x66a/0x9f0 [ 449.512655] ext4_ext_map_blocks+0x1bbf/0x4b30 06:02:46 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000140)={0x0, 0x5a, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, r1, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1f}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8714}]}, 0x24}, 0x1, 0x0, 0x0, 0x808}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:46 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, r2, 0x0, 0xff7ffffe) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r2, 0x40184150, &(0x7f0000000280)={0x0, &(0x7f0000000480)="b2993b51fb3b561f9017841e8886ec95bd1314c34e6840305c1b470a157cb3868c6f6f4c7b12b8090e264a040e0601c614c57723153faeefec7c39abee750c6317e7059a", 0x44}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x10200, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000380)={0x6, 0x0, 0x4, 0x110401, 0x0, {0x0, 0x2710}, {0x3, 0x2, 0x3f, 0x0, 0x1, 0x6, "a5cc5da5"}, 0x80, 0x4, @planes=&(0x7f0000000200)={0x18b0, 0x3f, @userptr=0x3, 0x7}, 0x8001, 0x0, r3}) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x41e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000, 0x9, 0x0, 0x0, 0x800}, 0x0, 0x9, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80450a00002f000000a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000000640)}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff90, 0x20008005, &(0x7f0000000100)={0x2, 0x4e21}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) perf_event_open(&(0x7f0000000500)={0x4, 0x70, 0x7, 0xeb, 0xa8, 0xf0, 0x0, 0x6, 0x10000, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x800000, 0x1, @perf_config_ext={0x3f, 0x6}, 0x4518e, 0x3, 0x138, 0x6, 0x0, 0x800, 0xf5}, r5, 0x8, r0, 0xa) [ 449.517233] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 449.522235] ? ext4_es_lookup_extent+0x321/0xac0 [ 449.526984] ? lock_acquire+0x170/0x3f0 [ 449.530948] ? lock_acquire+0x170/0x3f0 [ 449.534911] ? ext4_map_blocks+0x3c7/0x1600 [ 449.539229] ext4_map_blocks+0xc8f/0x1600 [ 449.543374] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 449.548818] ? ext4_issue_zeroout+0x150/0x150 [ 449.553299] ? __ext4_new_inode+0x278/0x4e80 [ 449.557703] ext4_getblk+0x98/0x3f0 [ 449.561320] ? ext4_iomap_begin+0x7f0/0x7f0 [ 449.565648] ? __dquot_initialize+0x3f4/0x980 [ 449.570139] ext4_bread+0x6c/0x1a0 [ 449.573673] ? ext4_getblk+0x3f0/0x3f0 [ 449.577563] ? inode_get_rsv_space.part.0+0x100/0x100 [ 449.582749] ? security_transition_sid+0xcb/0x120 [ 449.587591] ? security_transition_sid+0x9d/0x120 [ 449.592425] ext4_append+0x143/0x350 [ 449.596130] ext4_mkdir+0x4c9/0xb60 [ 449.599779] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 449.604437] ? security_inode_mkdir+0xcc/0x100 [ 449.609009] vfs_mkdir+0x3af/0x620 [ 449.612538] SyS_mkdirat+0x1b5/0x220 [ 449.616243] ? SyS_mknod+0x30/0x30 [ 449.619777] ? do_syscall_64+0x4c/0x640 [ 449.623758] ? SyS_mkdirat+0x220/0x220 [ 449.627637] do_syscall_64+0x1d5/0x640 [ 449.631521] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 449.636702] RIP: 0033:0x45bfa7 [ 449.639882] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 449.647589] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 449.654846] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 449.662107] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 449.669361] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 449.676614] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 449.731074] BTRFS error (device loop5): superblock checksum mismatch [ 449.782918] BTRFS error (device loop5): open_ctree failed 06:02:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="020f00001400000000000000000000eb04000600000000000a000000000091000000000000000000000000000000000000000000000000000000000000000200000000000000000006000000000000000000000000000000fe8800000000000000000000000000010000010000000000000000c0336690290000000005000500000000000ac51bc26e749e356ada270f00000000da38dff00d9a94f6b70c000000fe88000000000000000000b06e003042aee1041524fb0797fffb6af2f7710c208d6aa6"], 0xa0}}, 0x0) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1008030, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@fscache='fscache'}, {@aname={'aname', 0x3d, '\\,}'}}, {@access_uid={'access', 0x3d, r1}}, {@aname={'aname', 0x3d, 'btrfs\x00'}}, {@access_user='access=user'}], [{@smackfsroot={'smackfsroot', 0x3d, 'btrfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x62, 0x66, 0x34, 0x30, 0x30, 0x36, 0x38], 0x2d, [0x31, 0x63, 0x62, 0x33], 0x2d, [0x34, 0x34, 0x38, 0x65], 0x2d, [0x61, 0x0, 0x35, 0x30], 0x2d, [0x62, 0x39, 0x31, 0x33, 0x31, 0x36, 0x31, 0x63]}}}, {@subj_user={'subj_user', 0x3d, '!.'}}]}}) 06:02:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ff02000af9fdefff01004dd4b002000000000000007a0000000000fff6f2a22997480004000000b10efd9a000001000000000001fffffff6000000df42485266535f4db60fa4f9dcfa0af6e00bc69f85e641f911cb9453551fc46996d975d7be9452716feec81c2022f5aa13acfa3beeb59755c0943b65d9061cc5d6eef9b8fb9855e089f5513c955bd87a434490b621a3853687437025f3684078bafa00ce75", 0xa5, 0x10000}], 0x0, 0x0) 06:02:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$UI_DEV_CREATE(r0, 0x5501) 06:02:46 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed22000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 450.174879] FAULT_INJECTION: forcing a failure. [ 450.174879] name failslab, interval 1, probability 0, space 0, times 0 [ 450.207362] CPU: 0 PID: 9120 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 450.215162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:02:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 450.224517] Call Trace: [ 450.227096] dump_stack+0x1b2/0x283 [ 450.230725] should_fail.cold+0x10a/0x154 [ 450.234869] should_failslab+0xd6/0x130 [ 450.238835] __kmalloc+0x2c1/0x400 [ 450.242369] ? ext4_find_extent+0x772/0x9f0 [ 450.246683] ext4_find_extent+0x772/0x9f0 [ 450.250828] ext4_ext_map_blocks+0x16f/0x4b30 [ 450.255320] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 450.260342] ? ext4_es_lookup_extent+0x321/0xac0 [ 450.265095] ? ext4_map_blocks+0x5c6/0x1600 [ 450.269416] ? lock_acquire+0x170/0x3f0 06:02:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000340)=""/4096, &(0x7f0000000080)=0x1000) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x6002c3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x8400, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f00000013c0)={0x5, 0x1, 0x3}) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x14, r6, 0x536ae464467e3e0b, 0x0, 0x0, {0x21}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r3, &(0x7f0000001340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x64, r6, 0x100, 0x70bd26, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000}}]}, 0x64}, 0x1, 0x0, 0x0, 0x44811}, 0x4004) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 450.273382] ? ext4_map_blocks+0x798/0x1600 [ 450.277712] ext4_map_blocks+0x7ea/0x1600 [ 450.281860] ? ext4_issue_zeroout+0x150/0x150 [ 450.286345] ? __ext4_new_inode+0x278/0x4e80 [ 450.290741] ext4_getblk+0x98/0x3f0 [ 450.294344] ? ext4_iomap_begin+0x7f0/0x7f0 [ 450.298654] ? __dquot_initialize+0x3f4/0x980 [ 450.303265] ext4_bread+0x6c/0x1a0 [ 450.306798] ? ext4_getblk+0x3f0/0x3f0 [ 450.310682] ? inode_get_rsv_space.part.0+0x100/0x100 [ 450.315865] ? security_transition_sid+0xcb/0x120 [ 450.320698] ? security_transition_sid+0x9d/0x120 06:02:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/128, 0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000480)={r3, 0x5, 0x30}, &(0x7f00000004c0)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000500)={r4, @in={{0x2, 0x4ea2, @rand_addr=0x64010100}}}, 0x84) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x1000, &(0x7f0000000340)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0xfffffffffffffffa}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0x8001}}, {@mode={'mode'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x35, 0x38, 0x31, 0x39, 0x36, 0x38, 0x39, 0x30], 0x2d, [0x64, 0x66, 0x61, 0x35], 0x2d, [0x39, 0x34, 0x7, 0x36], 0x2d, [0x32, 0x39, 0x34, 0x34], 0x2d, [0x38, 0x1c, 0x32, 0x37, 0x62, 0x35, 0x36, 0x34]}}}]}) [ 450.325533] ext4_append+0x143/0x350 [ 450.329367] ext4_mkdir+0x4c9/0xb60 [ 450.332992] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 450.337651] ? security_inode_mkdir+0xcc/0x100 [ 450.342219] vfs_mkdir+0x3af/0x620 [ 450.345740] SyS_mkdirat+0x1b5/0x220 [ 450.349437] ? SyS_mknod+0x30/0x30 [ 450.352981] ? do_syscall_64+0x4c/0x640 [ 450.356948] ? SyS_mkdirat+0x220/0x220 [ 450.360832] do_syscall_64+0x1d5/0x640 [ 450.364719] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 450.369895] RIP: 0033:0x45bfa7 06:02:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="7bacbffae583967a505417db575e93e05b1ab778217f8c08906628d44e07e636a3bf97a158fb0c280e21dbb5dd7514b6b6c21b835d8fce251daad4bc32aa76e787dbe3b7b51e73212209a878b081847f49adc82d5f55485b5ffc01173b51fb1926bc559985f189174b8de150e34eff69497c0650564a6d09741a3ec3cba813e3d1412662b727269767254cd384ca4f39706ebd55c80fd196fa8bf16a2f23bfb4d600132b0f4d230d258e8bbfdf5f728d02833c083c", 0xb5}, {&(0x7f0000000140)="149e72babeb7ec3d94123b93e2097bcb5478d10d33641cecac6e8998ddb5a8209490e73fa751621220484534883d10833c8f8cf4c683ee6165641f967c51e00ce8a6dc360746af461c75fb1c0990031c6a62d82e38151b83f4a1e3b18073be", 0x5f}, {&(0x7f0000000340)="259cd463f9de5b77e56c4b522d16d825a51ff1b7fe782e364a87b59a313484a822bacf74ddb6b73b0c53f15ea417274f974f0a251eff6cf8bd94125ec7aa34281c324cffe727fee5d88a2095510a8f93de6b05ca5701d752098843a18354f9c710be0f8e04561bab9b6ad0d952146e742676343068870fc295881bba418e5330aa9db87963f53f769463e590dcfa53ff3729fcbff771e54f0215d63f53fc95752aa5381a532e4e8adf749978b3fd34cd489d68a9772e9ee38777eb39a919d25b17c209660c584a6888ae35071ef9a0f13c179f4ed93e695c09", 0xd9}], 0x3) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 450.373081] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 450.380769] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 450.388027] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 450.395281] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 450.402531] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 450.409782] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:47 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000001440)={0xa, 0x4e21, 0xffff, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f00000016c0)='./file0\x00', 0x5e3942, 0x5a) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001640)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffffffffff31c5) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f00000013c0)={0x1, "f0d1374cf5597445e237bb51c66a6f2dd60a9e860dafd0a37a6d1fd37f7dc413", 0x5, 0x72e48e151e57c37d, 0x9, 0x1, 0x10, 0x2, 0x800, 0x3}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001480)='/dev/sequencer2\x00', 0x84, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r4, &(0x7f0000001600)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001500)=ANY=[@ANYBLOB="bc000000000700000000000000000000070000020c0003400000000000007fff0c00078008000140000000000900010073797a31000000004400078008000140000000090800014000001000080001400001000108000240000004000800024000000200080002400000000708000140000000010800016000000fff0c00024000000000000000ad0c000640000000000000000608000540000000030c00024000000000000000000900010073797a31000000000800054000000003"], 0xbc}, 0x1, 0x0, 0x0, 0x40}, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000000080)="069565cdf4d1fad2075fa832aa74678d760c55401904830cc5acd16a0d7596c80b73d6e305f9b473a9221dc52b57a2bbdea3cb0397b9e46ccbfdf589e1ee7c64f42be97c34ae67701a8361ed2c0d5a5a06518a6bda99ac2cf2a317a8d918fe4b037491e0df4342b65efa09ac9ee171b7672d72eb01fac16ff462844fc99175d47dee332345bb18372ef9f99fff70be42305920aa17ef63f37a4ba68fdb6398fba85b1e3cf8aca307a4f4b82eeb3bf75417727af7d91e2d3be8870660569f8977c50df437849daa54da35bf06822718729013467b8d496fc5453f9e12", 0xdc, 0x401}, {&(0x7f0000000200)="7cc608bd50be069d1884925b6c3a5e03af3f7d881883235b63e2df1700d084d0cb557875c3e820ef76b9a397c54d510b89e43665e96823fdffed399baa71712dc5720ca5a2627a8ba2067e08b3c539f62642faa732602e4967e72fafa527ba65fd1d0303474ed696ca94599bfc7198c25023638d24146509976f32893f67a6eecf3b90dd7317d619a2f223e8d8d78bbf3bba2722a94c37c3770716d659e47064", 0xa0, 0x800}, {&(0x7f0000000340)="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", 0x1000, 0xbd}], 0x40, 0x0) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000001700)={&(0x7f0000001680), 0xc, &(0x7f0000001740)={&(0x7f00000017c0)=ANY=[@ANYBLOB="34000000050601080000000000000000050000080900020073797a3100007a97762eb7892d52000005000100070000000900020073797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x20000855) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r4, 0x28, 0x6, &(0x7f0000001780)={0x77359400}, 0x10) 06:02:47 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 450.522595] FAULT_INJECTION: forcing a failure. [ 450.522595] name failslab, interval 1, probability 0, space 0, times 0 [ 450.533779] CPU: 1 PID: 9142 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 450.541553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.550903] Call Trace: [ 450.553470] dump_stack+0x1b2/0x283 [ 450.557076] should_fail.cold+0x10a/0x154 [ 450.561205] should_failslab+0xd6/0x130 [ 450.565154] kmem_cache_alloc+0x40/0x3c0 [ 450.569193] __sigqueue_alloc+0x1b8/0x3e0 [ 450.573318] __send_signal+0x193/0x1280 [ 450.577271] force_sig_info+0x240/0x340 [ 450.581226] force_sig_info_fault.constprop.0+0x185/0x260 [ 450.586757] ? is_prefetch.isra.0.part.0+0x300/0x300 [ 450.591836] ? is_prefetch.isra.0.part.0+0x1fa/0x300 [ 450.596912] ? bad_area+0x4e/0x80 [ 450.600352] ? pgtable_bad+0x110/0x110 [ 450.604215] ? lock_downgrade+0x6e0/0x6e0 [ 450.608340] __bad_area_nosemaphore+0x1d6/0x2c0 [ 450.612982] ? up_read+0x17/0x30 [ 450.616336] __do_page_fault+0x842/0xb50 [ 450.620377] ? mm_fault_error+0x2c0/0x2c0 [ 450.624511] ? do_page_fault+0x60/0x4f2 [ 450.628468] ? page_fault+0x2f/0x50 [ 450.632082] page_fault+0x45/0x50 [ 450.635505] RIP: 0c2a:0x4ce758 06:02:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) setitimer(0x0, &(0x7f0000000200)={{0x77359400}, {0x0, 0x2710}}, 0x0) [ 450.638665] RSP: 50a1c0:000000000078bf00 EFLAGS: 00000003 [ 450.663455] BTRFS error (device loop5): superblock checksum mismatch [ 450.718364] BTRFS error (device loop5): open_ctree failed 06:02:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="020f00001400000000000000000000eb04000600000000000a000000000091000000000000000000000000000000000000000000000000000000000000000200000000000000000006000000000000000000000000000000fe8800000000000000000000000000010000010000000000000000c0336690290000000005000500000000000ac51bc26e749e356ada270f00000000da38dff00d9a94f6b70c000000fe88000000000000000000b06e003042aee1041524fb0797fffb6af2f7710c208d6aa6"], 0xa0}}, 0x0) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1008030, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@fscache='fscache'}, {@aname={'aname', 0x3d, '\\,}'}}, {@access_uid={'access', 0x3d, r1}}, {@aname={'aname', 0x3d, 'btrfs\x00'}}, {@access_user='access=user'}], [{@smackfsroot={'smackfsroot', 0x3d, 'btrfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x62, 0x66, 0x34, 0x30, 0x30, 0x36, 0x38], 0x2d, [0x31, 0x63, 0x62, 0x33], 0x2d, [0x34, 0x34, 0x38, 0x65], 0x2d, [0x61, 0x0, 0x35, 0x30], 0x2d, [0x62, 0x39, 0x31, 0x33, 0x31, 0x36, 0x31, 0x63]}}}, {@subj_user={'subj_user', 0x3d, '!.'}}]}}) 06:02:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000080)=0xda, 0x4) 06:02:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:47 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r2, 0x80006) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f00000000c0)=0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x7, &(0x7f0000000340)=[{@none}, {@none}, {@fixed}, {@fixed}, {}, {@none}, {@none}]}) 06:02:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$KVM_RUN(r0, 0xae80, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 450.885949] FAULT_INJECTION: forcing a failure. [ 450.885949] name failslab, interval 1, probability 0, space 0, times 0 [ 450.923684] CPU: 0 PID: 9176 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 06:02:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000200)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, &(0x7f00000000c0), 0x0, &(0x7f0000000500)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x46, 0x1, 0x4, [{@loopback, 0x1}, {@multicast2, 0x3}, {@multicast2, 0x8}, {@loopback, 0x6}]}, @timestamp={0x44, 0x10, 0x6, 0x0, 0x8, [0x9, 0x65, 0x7ff]}, @lsrr={0x83, 0xb, 0xff, [@broadcast, @multicast1]}, @timestamp={0x44, 0xc, 0x9, 0x0, 0xd, [0x4c7eb1df, 0x7fff]}, @timestamp_addr={0x44, 0x14, 0xf0, 0x1, 0x6, [{@rand_addr=0x64010101, 0x4}, {@loopback, 0xbdd}]}, @lsrr={0x83, 0x7, 0xf9, [@multicast2]}, @lsrr={0x83, 0x17, 0x4e, [@multicast2, @dev={0xac, 0x14, 0x14, 0x1a}, @remote, @empty, @empty]}, @end, @rr={0x7, 0x23, 0x9b, [@empty, @rand_addr=0x64010100, @loopback, @multicast2, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}]}}}, @ip_retopts={{0xd4, 0x0, 0x7, {[@lsrr={0x83, 0x17, 0xf2, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1c}, @remote, @multicast1]}, @rr={0x7, 0x1f, 0xd1, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @empty, @private=0xa010101, @local]}, @ssrr={0x89, 0x1b, 0x7c, [@rand_addr=0x64010102, @loopback, @broadcast, @multicast1, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x1f, 0xa3, [@private=0xa010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast2, @empty, @local, @dev={0xac, 0x14, 0x14, 0x37}]}, @timestamp_prespec={0x44, 0x2c, 0x6a, 0x3, 0x3, [{@broadcast, 0x7fffffff}, {@private=0xa010100, 0x740}, {@rand_addr=0x64010102, 0x2}, {@dev={0xac, 0x14, 0x14, 0x3a}, 0x3}, {@multicast1, 0x5}]}, @noop, @end, @timestamp={0x44, 0x1c, 0xff, 0x0, 0x9, [0x2b, 0x322, 0x8, 0x7, 0x80000001, 0xc5f]}, @timestamp={0x44, 0x8, 0x92, 0x0, 0x7, [0x7]}]}}}], 0x190}, 0x2000c001) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xfe}}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000240)='veth0_to_team\x00') [ 450.931498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.940841] Call Trace: [ 450.943429] dump_stack+0x1b2/0x283 [ 450.947054] should_fail.cold+0x10a/0x154 [ 450.951200] should_failslab+0xd6/0x130 [ 450.955163] kmem_cache_alloc+0x28e/0x3c0 [ 450.959301] ext4_mb_new_blocks+0x51f/0x3a50 [ 450.963706] ? ext4_ext_search_right+0x2bc/0xaa0 [ 450.968453] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 450.973459] ext4_ext_map_blocks+0x24a9/0x4b30 [ 450.978025] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 450.983152] ? ext4_es_lookup_extent+0x321/0xac0 [ 450.987907] ? ext4_map_blocks+0x5c6/0x1600 [ 450.992230] ext4_map_blocks+0x7ea/0x1600 [ 450.996364] ? ext4_issue_zeroout+0x150/0x150 [ 451.000844] ? __ext4_new_inode+0x278/0x4e80 [ 451.005254] ext4_getblk+0x98/0x3f0 [ 451.008876] ? ext4_iomap_begin+0x7f0/0x7f0 [ 451.013202] ? __dquot_initialize+0x3f4/0x980 [ 451.017694] ext4_bread+0x6c/0x1a0 [ 451.021223] ? ext4_getblk+0x3f0/0x3f0 [ 451.025103] ? inode_get_rsv_space.part.0+0x100/0x100 [ 451.030276] ? security_transition_sid+0xcb/0x120 [ 451.035129] ? security_transition_sid+0x9d/0x120 [ 451.039966] ext4_append+0x143/0x350 [ 451.043689] ext4_mkdir+0x4c9/0xb60 [ 451.047317] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 451.051988] ? security_inode_mkdir+0xcc/0x100 [ 451.056572] vfs_mkdir+0x3af/0x620 [ 451.060114] SyS_mkdirat+0x1b5/0x220 [ 451.063815] ? SyS_mknod+0x30/0x30 [ 451.067333] ? do_syscall_64+0x4c/0x640 [ 451.071292] ? SyS_mkdirat+0x220/0x220 [ 451.075174] do_syscall_64+0x1d5/0x640 [ 451.079067] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 451.084248] RIP: 0033:0x45bfa7 [ 451.087429] RSP: 002b:00007f77bb349a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 451.095121] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045bfa7 [ 451.102363] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 451.109608] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 451.116851] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 451.124099] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:47 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000000c0)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000003440)="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", 0x1162, 0x4db2}, {&(0x7f0000001340)="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", 0x1000, 0x1}, {&(0x7f0000000080)="46540073459e88dfbfc6ad4f60289b9bdd8fccf97d848f6ef176d8", 0x1b, 0x5}], 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) rt_tgsigqueueinfo(r3, r5, 0x17, &(0x7f0000000140)={0x22, 0x8000, 0x7f}) 06:02:48 executing program 1: r0 = open(&(0x7f0000000280)='./file0/file0\x00', 0x141042, 0x180) ftruncate(r0, 0x80006) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f00000001c0)={{0x9, 0x7}, 'port1\x00', 0x10, 0x10040, 0x97, 0x8001, 0x7ea, 0x7c695fe4, 0x9, 0x0, 0x4, 0x80}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000180)='./file0/file0\x00', 0x20, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="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", 0xfa, 0x2}], 0x10000c1, 0x0) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) [ 451.332834] FAULT_INJECTION: forcing a failure. [ 451.332834] name failslab, interval 1, probability 0, space 0, times 0 [ 451.344066] CPU: 0 PID: 9221 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 451.351848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.361192] Call Trace: [ 451.363764] dump_stack+0x1b2/0x283 [ 451.367384] should_fail.cold+0x10a/0x154 [ 451.371512] should_failslab+0xd6/0x130 [ 451.375462] kmem_cache_alloc+0x40/0x3c0 [ 451.379501] __sigqueue_alloc+0x1b8/0x3e0 [ 451.383625] __send_signal+0x193/0x1280 [ 451.387576] force_sig_info+0x240/0x340 [ 451.391530] force_sig_info_fault.constprop.0+0x185/0x260 [ 451.397040] ? is_prefetch.isra.0.part.0+0x300/0x300 [ 451.402119] ? is_prefetch.isra.0.part.0+0x1fa/0x300 [ 451.407282] ? bad_area+0x4e/0x80 [ 451.410711] ? pgtable_bad+0x110/0x110 [ 451.414577] ? lock_downgrade+0x6e0/0x6e0 [ 451.418706] __bad_area_nosemaphore+0x1d6/0x2c0 [ 451.423351] ? up_read+0x17/0x30 [ 451.426712] __do_page_fault+0x842/0xb50 [ 451.430752] ? mm_fault_error+0x2c0/0x2c0 [ 451.434876] ? do_page_fault+0x60/0x4f2 [ 451.438829] ? page_fault+0x2f/0x50 [ 451.442429] page_fault+0x45/0x50 [ 451.445853] RIP: 0c2a:0x4ce758 [ 451.449013] RSP: 50a1c0:000000000078bf00 EFLAGS: 00000003 [ 451.499860] BTRFS error (device loop5): superblock checksum mismatch [ 451.564586] BTRFS error (device loop5): open_ctree failed 06:02:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="020f00001400000000000000000000eb04000600000000000a000000000091000000000000000000000000000000000000000000000000000000000000000200000000000000000006000000000000000000000000000000fe8800000000000000000000000000010000010000000000000000c0336690290000000005000500000000000ac51bc26e749e356ada270f00000000da38dff00d9a94f6b70c000000fe88000000000000000000b06e003042aee1041524fb0797fffb6af2f7710c208d6aa6"], 0xa0}}, 0x0) 06:02:48 executing program 3: r0 = socket(0x11, 0x800000003, 0x50b) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:default_t:s0\x00', 0x1f, 0x2) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$DRM_IOCTL_MODE_SETGAMMA(r1, 0xc02064a5, &(0x7f0000000380)={0x800, 0x5, &(0x7f0000000200)=[0x80, 0x8, 0x8, 0x5, 0x1000], &(0x7f0000000240)=[0x65e0, 0x0, 0xcc, 0x8f, 0x101, 0x81], &(0x7f0000000340)=[0x3, 0x3]}) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) accept$phonet_pipe(r0, 0x0, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000), 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0xf34, 0x0, 0x100, 0x2, 0x0}, &(0x7f0000000180)=0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200)={r6, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000340)={r3, 0x0, 0x4, 0x1, 0x2, 0x6, 0x200, 0x8, {r7, @in={{0x2, 0x4e24, @loopback}}, 0x81, 0x9, 0x6c9, 0xf2, 0xffffff7f}}, &(0x7f0000000280)=0xb0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x10) 06:02:48 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 451.753775] FAULT_INJECTION: forcing a failure. [ 451.753775] name failslab, interval 1, probability 0, space 0, times 0 [ 451.773996] CPU: 0 PID: 9247 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 451.781805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.791149] Call Trace: [ 451.793747] dump_stack+0x1b2/0x283 [ 451.797384] should_fail.cold+0x10a/0x154 [ 451.801636] should_failslab+0xd6/0x130 [ 451.805610] __kmalloc_track_caller+0x2bc/0x400 [ 451.810273] ? strndup_user+0x5b/0xf0 [ 451.814069] memdup_user+0x22/0xa0 [ 451.817608] strndup_user+0x5b/0xf0 [ 451.821224] ? copy_mnt_ns+0x8a0/0x8a0 [ 451.825129] SyS_mount+0x39/0x120 [ 451.828600] ? copy_mnt_ns+0x8a0/0x8a0 [ 451.832495] do_syscall_64+0x1d5/0x640 [ 451.836402] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 451.841600] RIP: 0033:0x45f57a [ 451.844781] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:02:48 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x8a000, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000, 0x0, 0xffff}, r2, 0x2000000000000000, r0, 0x3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 451.852490] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 451.859752] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 451.867011] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 451.874271] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 451.881548] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:48 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 451.993979] FAULT_INJECTION: forcing a failure. [ 451.993979] name failslab, interval 1, probability 0, space 0, times 0 [ 452.017084] CPU: 1 PID: 9278 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 452.024880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.034215] Call Trace: [ 452.036778] dump_stack+0x1b2/0x283 [ 452.040389] should_fail.cold+0x10a/0x154 [ 452.044512] should_failslab+0xd6/0x130 [ 452.048462] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 452.053102] ? _copy_from_user+0x94/0x100 [ 452.057222] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.061090] copy_mount_options+0x59/0x2e0 [ 452.065298] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.069156] SyS_mount+0x84/0x120 [ 452.072580] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.076493] do_syscall_64+0x1d5/0x640 [ 452.080353] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 452.085528] RIP: 0033:0x45f57a 06:02:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000080)=""/167) [ 452.088686] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 452.096365] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 452.103609] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 452.110848] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 452.118085] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 452.125322] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f0000000080)={0x18, 0x0, 0x0, 0x3}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:48 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r10) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2000, 0x4, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)={0x330, 0xfffffffffffffffe, 0x3, [{{0x1, 0x0, 0x3ff, 0x800, 0x8, 0x7, {0x4, 0x4, 0x81, 0x3, 0x761a, 0x1, 0x5, 0x6, 0xfb, 0x4, 0x5, r1, r3, 0x7, 0x40}}, {0x0, 0x1, 0x6, 0x200, 'btrfs\x00'}}, {{0x5, 0x0, 0x6, 0x5, 0x1, 0x80000000, {0x5, 0xfffffffffffffffb, 0xffffffffffffc173, 0xfffffffffffffff8, 0x100000000, 0x4, 0x7, 0x9, 0x59a8, 0x4, 0x100, r4, 0x0, 0x200, 0x6}}, {0x4, 0x4, 0x1, 0x1ff, '&'}}, {{0x5, 0x1, 0x1, 0x0, 0x7, 0x5, {0x5, 0x100, 0x4000000000000, 0x3, 0xfff, 0x6, 0x5b, 0x2, 0x200, 0xfffffffe, 0x81, 0xffffffffffffffff, r5, 0xf8, 0xbf}}, {0x2, 0x401, 0x3, 0xfff, '^]}'}}, {{0x2, 0x3, 0xd3, 0xfff, 0x10001, 0x1f, {0x0, 0x9, 0x1, 0x1, 0xe7b, 0x10000, 0x8, 0x2, 0x7, 0x3, 0x7, r7, r8, 0x8, 0x1}}, {0x3, 0x200, 0x7, 0x8, '!$):]))'}}, {{0x3, 0x2, 0xffffffffffffff64, 0x1, 0x2, 0x3f, {0x5, 0x5, 0x100, 0x3, 0x3ff, 0x6, 0x400, 0x7f, 0x3, 0xffffffff, 0x9, r10, r11, 0x7f80000, 0x1}}, {0x1, 0x5, 0x6, 0x3f, 'btrfs\x00'}}]}, 0x330) [ 452.286539] FAULT_INJECTION: forcing a failure. [ 452.286539] name failslab, interval 1, probability 0, space 0, times 0 [ 452.310975] CPU: 1 PID: 9299 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 452.318782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.328122] Call Trace: [ 452.330706] dump_stack+0x1b2/0x283 06:02:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x8fbc6ab}], 0x218003, 0x0) eventfd(0x7ff) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)=""/16, &(0x7f00000000c0)=0x10) [ 452.334329] should_fail.cold+0x10a/0x154 [ 452.338471] should_failslab+0xd6/0x130 [ 452.342459] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 452.347120] ? _copy_from_user+0x94/0x100 [ 452.351265] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.355143] copy_mount_options+0x59/0x2e0 [ 452.359368] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.363244] SyS_mount+0x84/0x120 [ 452.366678] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.370554] do_syscall_64+0x1d5/0x640 [ 452.374427] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 452.379585] RIP: 0033:0x45f57a [ 452.382749] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 452.390437] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 452.397685] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 452.404926] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 452.412168] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 452.419410] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000100)=0x81) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) socket$key(0xf, 0x3, 0x2) 06:02:49 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x9, 0x232000) 06:02:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) [ 452.687431] FAULT_INJECTION: forcing a failure. [ 452.687431] name failslab, interval 1, probability 0, space 0, times 0 [ 452.701057] CPU: 1 PID: 9339 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 452.708854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.718194] Call Trace: [ 452.720786] dump_stack+0x1b2/0x283 [ 452.724438] should_fail.cold+0x10a/0x154 [ 452.728588] should_failslab+0xd6/0x130 [ 452.732561] kmem_cache_alloc+0x28e/0x3c0 [ 452.736701] getname_flags+0xc8/0x550 [ 452.740498] user_path_at_empty+0x2a/0x50 [ 452.744637] do_mount+0x10b/0x25e0 [ 452.748171] ? copy_mount_string+0x40/0x40 [ 452.752393] ? rcu_read_lock_sched_held+0x10a/0x130 [ 452.757397] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 452.762233] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.766107] ? copy_mount_options+0x1ec/0x2e0 [ 452.770588] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.774465] SyS_mount+0xa8/0x120 [ 452.777906] ? copy_mnt_ns+0x8a0/0x8a0 [ 452.781785] do_syscall_64+0x1d5/0x640 [ 452.785668] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 452.790842] RIP: 0033:0x45f57a [ 452.794017] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 452.801712] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 452.808965] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 452.816216] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 452.823462] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 452.830789] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000640)) 06:02:49 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000b40)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0xc880) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="a5f89695f71acd46cb27c01d767cc33d5066962bb1f4d79910da95c242ab3cbd", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={r4, 0x7, 0x4, 0x1000, 0x3ff, 0x9b9, 0x5, 0x7, {r7, @in6={{0xa, 0x4e22, 0x1, @loopback, 0x9}}, 0x81, 0x1000, 0xfffffffe, 0x1, 0x80000000}}, &(0x7f0000000180)=0xb0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240)='tmpfs\x00', &(0x7f0000000340)='./file0\x00', 0x9, 0x7, &(0x7f0000000980)=[{&(0x7f0000000380)="50683988194584ecc76f36d3fd7163ff76726cfbbf5762b25cbcd6ec9780a900b566e8f51d4bd6abbeabc59d906988c0a5dfc56dd79369cd2fda50c834bd51eeb4d8ee7a1bf114c28dd13d4701a5492d4f4a27a5da32b6da2cd364ab35e540a8c559f37a9974a25b27c634f14ab6511b1e28001b338d1a07ec59188cd73142bdb58bda71184d59542f8ef8f5ff8c99ecb8609e", 0x93, 0x3}, {&(0x7f0000000440)="7cfff833568f1bec5ed6f1d39270507361f0ff0c193c5fa19da54f4b3529807d61797fe02fbb7981b61e988640ca9e2be06484da69126771954fe5f1797980423eba43d9861f2b13fd284abb8a46ad1be329bd4807afaad6669133ad5c1673c21956915338ac5f592251992c855c187361b250b0a56e47bc4e82cb33315beca0f42c3faa373feff700709414eadee79890ecad8142a0b0d9e507a295cb330f5288c25e3322f60ccf8adc6c782ec3a79722300e68b77464283ab395db92994bb2b703", 0xc2, 0x1}, {&(0x7f0000000540)="edb918a645ce8cd0a2131ef1391f50ae6e9de6e460d5961123453bb07af48a9ff985a207afc2ee517bfc6df0a04bde2a29ceefafde455c99bf81d625e0fea7366a87375d9e01d61bf1f9a15dd832d8bf53d3222a316fac882473c086a4fe3f9bb5b3086c8e56600661fa9c92ddc23c1df709a403c3403730cc5f788f63adce15a6bddeba", 0x84, 0x7}, {&(0x7f0000000600)="85a77326c86788306d76c4815cf8c0bd9f53f7983b937c560517a3d791b118e50a5ca0464ed8faa2ae5642c8960dbf42da0f133f53e47ae5007827146012a3bc6d7590568d2b2289ec83eec12e522e59beffb75ae8142a688acdcfe8f9deae625ceabdd47a12f4cb1dd965efa633bfb4fc07dc9eb053f819c75a088186b475c0b62295643843451bca0301a5786723bd1fa79f0746ccb97392a20c9a34a28ccefb5559b9f7768cee70378a12b786394d5ba5783a58451ae2b23daf82a49b65cb04742b264d109d3d118971668150d63a492331255358c7757d52f7a39ed2dbc5dca4cdfe5acf42cd1059e86fecdd933d5947689cad354462f932", 0xfa, 0x588}, {&(0x7f0000000700)="8f9ebacb5295504678a6b4da8aa194d2fcb93b1ba0bee925725c05dafafff4943d8adeb18085940550119147a084dd5665e65e3a6d4d81222d1be829554181a98f38d5f35f81bb66cfa3ec29", 0x4c, 0x5}, {&(0x7f0000000780)="acd0999fd1eaeb9b350969d51deb1bc1877ffe8fe93e8a32e70fbb44e025143e7927354cc7a1f6e4642344c42b207b862a75b4fafdaec65fad00a61a96d5cd572ffab19b929226e9655ecf81850ee86185a7a1f5955d92d6aec40825e49563efbab218cfad42c5eef1c2bfcdb2edee21ad7cfeef6786005111eefcb1af1306284383e0164109956fc8736973e094f03fabd653e809c6e30e8b3fd02f6cf8df724a7dd24839eae84b83dda52692c57c25f3413e8eebf8ae077ed963eff9b717d61869546c6c38714811b2bd795325cfdc664d106b7249e61c8b7ff93e8f4af0924b40d7e69b67", 0xe6, 0x1}, {&(0x7f0000000880)="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", 0xfb, 0x10001}], 0x4000, &(0x7f0000000a40)={[{@huge_never={'huge=never'}}, {@huge_within_size={'huge=within_size', 0x3d, '}'}}, {@huge_always={'huge=always', 0x3d, 'bbr\x00'}}, {@size={'size', 0x3d, [0x2d, 0x33]}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x0, 0x30]}}}}, {@huge_always={'huge=always', 0x3d, 'bbr\x00'}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@hash='hash'}, {@dont_measure='dont_measure'}]}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 06:02:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0xfffc}], 0x0, 0x0) [ 452.876851] print_req_error: 8 callbacks suppressed [ 452.876857] print_req_error: I/O error, dev loop4, sector 128 06:02:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r3) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000080)={0x7, 0x7, 0x3}, &(0x7f00000000c0)=0x28) 06:02:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41d1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x17}, 0x182a3, 0x0, 0x1000000, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000280)=0xed, 0x4) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) sendmsg$inet(r0, &(0x7f0000001880)={&(0x7f0000000500)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="144d51469dfc7deb8856aa94af690f87bc2161f749999ddc", 0x18}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000380)="508c7936932e3867eae5b19de2ae3ac62980221b0f51bb7d3ae776ba36a492b41a1d83fb40243df559f4ccbb0000000000000071f934cf33f260ff9b8466ef687701ff219ce27b16d5ee46629f4f", 0x4e}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000000200)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000000}}], 0x48}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:49 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 453.014224] FAULT_INJECTION: forcing a failure. [ 453.014224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 453.026140] CPU: 0 PID: 9377 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 453.033923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.043258] Call Trace: [ 453.045846] dump_stack+0x1b2/0x283 [ 453.049473] should_fail.cold+0x10a/0x154 [ 453.053608] ? unwind_next_frame+0xe38/0x1700 [ 453.058096] __alloc_pages_nodemask+0x22b/0x2730 [ 453.062844] ? is_bpf_text_address+0xa3/0x120 [ 453.067315] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 453.072150] ? trace_hardirqs_on+0x10/0x10 [ 453.076361] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 453.080830] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 453.085294] ? kmem_cache_alloc_trace+0x14d/0x3f0 [ 453.090107] ? copy_mount_options+0x59/0x2e0 [ 453.094487] ? SyS_mount+0x84/0x120 [ 453.098092] cache_grow_begin+0x91/0x410 [ 453.102144] cache_alloc_refill+0x28c/0x360 [ 453.106470] kmem_cache_alloc+0x333/0x3c0 [ 453.110609] getname_flags+0xc8/0x550 [ 453.114395] user_path_at_empty+0x2a/0x50 [ 453.118526] do_mount+0x10b/0x25e0 [ 453.122050] ? copy_mount_string+0x40/0x40 [ 453.126257] ? rcu_read_lock_sched_held+0x10a/0x130 [ 453.131244] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 453.136058] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.139924] ? copy_mount_options+0x1ec/0x2e0 [ 453.144396] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.148261] SyS_mount+0xa8/0x120 [ 453.151695] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.155562] do_syscall_64+0x1d5/0x640 [ 453.159542] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 453.164711] RIP: 0033:0x45f57a [ 453.167881] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 453.175578] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 453.182829] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 453.190070] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 453.197310] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 453.204556] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 453.217385] BTRFS error (device loop5): superblock checksum mismatch [ 453.278022] BTRFS error (device loop5): open_ctree failed 06:02:50 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 453.375624] FAULT_INJECTION: forcing a failure. [ 453.375624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 453.387515] CPU: 1 PID: 9397 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 453.395317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.404655] Call Trace: [ 453.407220] dump_stack+0x1b2/0x283 [ 453.410842] should_fail.cold+0x10a/0x154 [ 453.414970] ? unwind_next_frame+0xe38/0x1700 [ 453.419437] __alloc_pages_nodemask+0x22b/0x2730 [ 453.424177] ? is_bpf_text_address+0xa3/0x120 [ 453.428646] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 453.433463] ? trace_hardirqs_on+0x10/0x10 [ 453.437679] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 453.442157] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 453.446623] ? kmem_cache_alloc_trace+0x14d/0x3f0 [ 453.451439] ? copy_mount_options+0x59/0x2e0 [ 453.455825] ? SyS_mount+0x84/0x120 [ 453.459445] cache_grow_begin+0x91/0x410 [ 453.463488] cache_alloc_refill+0x28c/0x360 [ 453.467791] kmem_cache_alloc+0x333/0x3c0 [ 453.471915] getname_flags+0xc8/0x550 [ 453.475695] user_path_at_empty+0x2a/0x50 [ 453.479816] do_mount+0x10b/0x25e0 [ 453.483333] ? copy_mount_string+0x40/0x40 [ 453.487554] ? rcu_read_lock_sched_held+0x10a/0x130 [ 453.492549] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 453.497370] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.501237] ? copy_mount_options+0x1ec/0x2e0 [ 453.505704] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.509565] SyS_mount+0xa8/0x120 [ 453.512993] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.516856] do_syscall_64+0x1d5/0x640 [ 453.520723] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 453.525885] RIP: 0033:0x45f57a [ 453.529049] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 453.536729] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 453.543971] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 453.551212] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 453.558457] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 453.565698] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) [ 453.585908] BTRFS error (device loop5): superblock checksum mismatch 06:02:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) connect$phonet_pipe(r2, &(0x7f0000000080)={0x23, 0x3, 0x40, 0x7f}, 0x10) [ 453.657644] BTRFS error (device loop5): open_ctree failed 06:02:50 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 453.751625] print_req_error: I/O error, dev loop2, sector 0 [ 453.784092] FAULT_INJECTION: forcing a failure. [ 453.784092] name failslab, interval 1, probability 0, space 0, times 0 [ 453.813206] CPU: 0 PID: 9423 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 453.821006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.830347] Call Trace: [ 453.832929] dump_stack+0x1b2/0x283 [ 453.836548] should_fail.cold+0x10a/0x154 [ 453.840690] should_failslab+0xd6/0x130 [ 453.844770] __kmalloc_track_caller+0x2bc/0x400 [ 453.849429] ? btrfs_parse_early_options+0xa3/0x310 [ 453.854439] kstrdup+0x36/0x70 [ 453.857622] btrfs_parse_early_options+0xa3/0x310 [ 453.862454] ? __lock_acquire+0x655/0x42a0 [ 453.866803] ? btrfs_kill_super+0x540/0x540 [ 453.871119] ? lock_acquire+0x170/0x3f0 [ 453.875085] ? pcpu_alloc+0x86f/0xf70 [ 453.878878] ? trace_hardirqs_on+0x10/0x10 [ 453.883098] ? pcpu_alloc+0x86f/0xf70 [ 453.886889] ? __mutex_lock+0x2cb/0x1430 [ 453.890941] ? kstrdup_const+0x35/0x60 [ 453.894821] btrfs_mount+0x119/0x2838 [ 453.898626] ? lock_downgrade+0x6e0/0x6e0 [ 453.902759] ? _find_next_bit+0xdb/0x100 [ 453.906811] ? pcpu_alloc+0x37d/0xf70 06:02:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, r2, 0x0, 0xff7ffffe) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000280)=[0x1ff, 0x7fffffff]) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r3, 0x0, 0xff7ffffe) write$P9_RSTATFS(r3, &(0x7f0000000200)={0x43, 0x9, 0x1, {0x80000000, 0x6, 0x1, 0x1ff, 0x10000, 0x9, 0x588f, 0x3ff, 0x80000001}}, 0x43) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000a0efeffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a7f2f01000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x1ab0808, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) init_module(&(0x7f0000000080)='btrfs\x00', 0x6, &(0x7f00000000c0)='btrfs\x00') 06:02:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x81, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xcc, 0x0, 0x7, 0x801, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xe41}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x3}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x4c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1f}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xc0}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xffff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8a}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8040}, 0x1) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x2, 0x7, 0x20}}, 0x30) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 453.910606] ? btrfs_remount+0x10c0/0x10c0 [ 453.914841] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 453.920281] ? rcu_read_lock_sched_held+0x10a/0x130 [ 453.925285] ? pcpu_alloc+0xe1/0xf70 [ 453.928995] ? pcpu_find_block_fit+0x380/0x380 [ 453.933570] ? __lockdep_init_map+0x100/0x560 [ 453.938057] ? __lockdep_init_map+0x100/0x560 [ 453.942547] mount_fs+0x92/0x2a0 [ 453.945907] vfs_kern_mount.part.0+0x5b/0x3c0 [ 453.950405] do_mount+0x3c9/0x25e0 [ 453.953970] ? copy_mount_string+0x40/0x40 [ 453.958201] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 453.963036] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.966910] ? copy_mount_options+0x1ec/0x2e0 [ 453.971394] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.975256] SyS_mount+0xa8/0x120 [ 453.978684] ? copy_mnt_ns+0x8a0/0x8a0 [ 453.982556] do_syscall_64+0x1d5/0x640 [ 453.986426] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 453.991594] RIP: 0033:0x45f57a [ 453.994755] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 454.002438] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 454.009680] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 454.016924] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 454.024170] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 454.031414] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:50 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 06:02:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000080)={[0x20]}, &(0x7f00000000c0), 0x8) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file1\x00'}, 0x6e) 06:02:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000640)={{0x3, 0x4, 0x6, 0x1, '\x00', 0x100}, 0x0, [0x3e0b, 0x100000000, 0xd4e7, 0x4, 0x7, 0x1, 0x1f, 0x7, 0x1, 0x9, 0x7fff, 0x7, 0x2852, 0x3, 0x652, 0x5, 0x5, 0x2, 0x9, 0x8, 0x401, 0x0, 0xb5c5, 0xc7b, 0x7, 0xb, 0x5, 0x76, 0x8, 0x6, 0x1, 0x5, 0x2, 0x7, 0x10000, 0x2, 0x3, 0x9, 0x2, 0x100, 0x79, 0xfffffffffffffffa, 0x1a3, 0x7, 0xffffffff, 0x1, 0xfffffffffffffffc, 0x7, 0x6, 0x2, 0x8, 0x3, 0x1, 0x8, 0x2, 0xfc57, 0x5, 0xffff, 0x9, 0x7, 0x8, 0x5, 0x10001, 0xfffffffffffffffc, 0x8, 0x100000001, 0x3, 0x5, 0x3, 0x7, 0x200, 0x9, 0xfffffffffffffffc, 0x7, 0x6, 0x8, 0x2, 0x8, 0x8, 0xfff, 0x3, 0x783a, 0x2, 0xfffffffffffffff8, 0xfff, 0x100, 0x1ff, 0x6b, 0x5, 0x6, 0x9, 0x5, 0x10001, 0x100000001, 0x6, 0xfff, 0x8001, 0x7, 0x2d93, 0x7, 0x8, 0x3ff, 0xf7, 0x8, 0x6, 0x81, 0x401, 0xfffffffffffffff8, 0x7, 0xf84, 0x40, 0x0, 0x9, 0x7, 0x80000000, 0x7, 0xfffffffffffffffe, 0x4, 0x80000000, 0x9, 0x3, 0x100000000, 0x100, 0x6, 0x3, 0x7, 0x8, 0x722]}) [ 454.125079] FAULT_INJECTION: forcing a failure. [ 454.125079] name failslab, interval 1, probability 0, space 0, times 0 [ 454.140774] CPU: 1 PID: 9455 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 454.148564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.157910] Call Trace: [ 454.160511] dump_stack+0x1b2/0x283 [ 454.164133] should_fail.cold+0x10a/0x154 [ 454.168298] should_failslab+0xd6/0x130 [ 454.172257] __kmalloc+0x2c1/0x400 [ 454.175783] ? btrfs_mount+0x189/0x2838 [ 454.179742] ? kstrdup_const+0x35/0x60 [ 454.183615] btrfs_mount+0x189/0x2838 [ 454.187406] ? _find_next_bit+0xdb/0x100 [ 454.191462] ? pcpu_alloc+0x37d/0xf70 [ 454.195253] ? btrfs_remount+0x10c0/0x10c0 [ 454.199487] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 454.204926] ? rcu_read_lock_sched_held+0x10a/0x130 [ 454.209928] ? pcpu_alloc+0xe1/0xf70 [ 454.213638] ? pcpu_find_block_fit+0x380/0x380 [ 454.218207] ? __lockdep_init_map+0x100/0x560 [ 454.222694] ? __lockdep_init_map+0x100/0x560 [ 454.227180] mount_fs+0x92/0x2a0 [ 454.230542] vfs_kern_mount.part.0+0x5b/0x3c0 [ 454.235028] do_mount+0x3c9/0x25e0 [ 454.238560] ? copy_mount_string+0x40/0x40 [ 454.242798] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 454.247628] ? copy_mnt_ns+0x8a0/0x8a0 [ 454.251504] ? copy_mount_options+0x1ec/0x2e0 [ 454.255986] ? copy_mnt_ns+0x8a0/0x8a0 [ 454.259865] SyS_mount+0xa8/0x120 [ 454.263306] ? copy_mnt_ns+0x8a0/0x8a0 [ 454.267200] do_syscall_64+0x1d5/0x640 06:02:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0xa80000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r2) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fcntl$setflags(r0, 0x2, 0x1) r3 = socket(0x11, 0x800000003, 0x8) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r5) statx(r0, &(0x7f0000000800)='./file0\x00', 0x2000, 0x4, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000340)='./file0\x00', 0x3, 0x4, &(0x7f0000000780)=[{&(0x7f0000000380)="e100467302aff396c2eacc9beac0c90503fb225e42563d07dc7f2204fd449d0cd2709f6a3d331fc98bf2e13eacd1356fd97883f5de9abba5d01b952b5255c74f1283e9e5e7b823b909c94b3b5bbf5eb119de88eb81a2b34f9b2f70c46d564094c125888d7ff3dafd8c1ce85f7d69022d18df2abe21a0004b41dc0e17c26a0eebb5e7ee3aae0907ae9123d776e0361ce242ba3735e70457b36211e538354f8f022f693392f0fa8f304bc978b372e8689880688d0f9b9065c2f68d31450df63b8782974a7f83f5409b5bcdf6001f12f9edbc2e36572ae8fec5cb291c74", 0xdc, 0x101}, {&(0x7f0000000500)="d73af1087bb47d11479a1d520d749fc8be1999fc5b4b141f4695b27638dc4318ac302f8573ae49263eeac073a6993ca98548e99b929c756e68acbae0b33f192752f4e37cdec5474f36b8c1efca712d3d8adb0708b3c29f14f337565ee84d1f247a5756159aa937949c5c7f6c7bd6a2c12093741d88c802853aeeb5d02573d3c296e69f33e34988ad9c7eff3a92751ea07d4190ba0995ca076caf4f64fe158da706235b6f0f7af1e6ecb86583f022d639c495b65ac080f8b5b529bc998476137ce0245d459fb076c250b2ca147779e3a3268cb95936f6be2b8a0f8f29ac37f18f5c8eafbb47e89f94a64ba94c", 0xec, 0x4}, {&(0x7f0000000600)="3a36a33b9b4f806e3d8e1790214ca469de76d7b9dede3f7347bc2b145934fa059f87c9e2fe8cd4e9d63468b3d3b3c06357d7694507cb454a84e92efdb4754ed04c69c73400c192134d5f68cfd429cd6517053c5397536cacfa18e4207b48f263df92a4aef8c96cb643dfc8d9e76709920ad952562caad6ee775b6ce1109e33ca07648d42f1e7793e80b3efd852b4b6565fe923b3c2", 0x95, 0x9}, {&(0x7f00000006c0)="2a009ec31e55e747cc4aa9506fdafcb251bf46cc839c47419b3cdc89c7e8f3f32763acf377043acd47ad3bcae86cd50a8e5d7d9e7fa5fbdcb71466429b216ff7b52f2fbf8cb6631dcc02e473f09d05f8d77d2318d5429674272eb8276e536a599190a7d08cc95eaa0aa29201913b8f86b4290360b911ad8471b731c22875c4fe957900067bc3af0c086de06edd7a4e1b0ee86545ce183a3bcb67245551644404433976b6f1881d763b4253c7e1cf68b1f3f411a99e43", 0xb6, 0x5}], 0x100000, &(0x7f0000000940)={[{@part={'part', 0x3d, 0x1}}, {@gid={'gid', 0x3d, r5}}, {@dir_umask={'dir_umask', 0x3d, 0x66}}, {@creator={'creator', 0x3d, "6e2ff716"}}, {@gid={'gid', 0x3d, r6}}, {@quiet='quiet'}], [{@audit='audit'}]}) finit_module(r3, &(0x7f0000000180)='bbr\x00', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) connect$nfc_raw(r3, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5}, 0x10) 06:02:51 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000200)={0x1, 0x1, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 454.271082] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 454.276256] RIP: 0033:0x45f57a [ 454.279433] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 454.287127] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 454.294383] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 454.301641] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 454.308899] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 454.316153] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0xfffffffffffffffe, 0x80000) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'gretap0\x00', 0x5}) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) accept$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@rose, @default, @default, @bcast, @default, @default, @default, @bcast]}, &(0x7f0000000200)=0x48) 06:02:51 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x5) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x4000}, 0x8001) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:51 executing program 1: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80, 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7f) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x128, r2, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x5c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6e8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_SOCK={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xf606}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffc}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7fff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x94c}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4}, 0x40000) select(0x40, &(0x7f0000000080)={0x2, 0x1, 0x7, 0x6, 0x24000000000, 0x5, 0x100000000, 0x2}, &(0x7f00000000c0)={0x5, 0x4ccd, 0x7, 0x81, 0x4, 0x7fff, 0x80000001, 0x400}, &(0x7f0000000100)={0x81, 0x0, 0x7f, 0xc17b, 0x4, 0x6, 0x8, 0x6}, &(0x7f0000000140)={0x0, 0xea60}) 06:02:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) 06:02:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000200)) [ 454.590619] FAULT_INJECTION: forcing a failure. [ 454.590619] name failslab, interval 1, probability 0, space 0, times 0 [ 454.624600] CPU: 0 PID: 9492 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 454.632401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.641740] Call Trace: [ 454.644320] dump_stack+0x1b2/0x283 [ 454.647939] should_fail.cold+0x10a/0x154 [ 454.652080] should_failslab+0xd6/0x130 [ 454.656042] __kmalloc+0x2c1/0x400 [ 454.659567] ? btrfs_mount+0x189/0x2838 [ 454.663618] btrfs_mount+0x189/0x2838 [ 454.667406] ? check_preemption_disabled+0x35/0x240 [ 454.672432] ? btrfs_remount+0x10c0/0x10c0 [ 454.676663] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 454.682107] ? rcu_read_lock_sched_held+0x10a/0x130 [ 454.687118] ? pcpu_alloc+0xe1/0xf70 [ 454.690852] ? pcpu_find_block_fit+0x380/0x380 [ 454.695420] ? __lockdep_init_map+0x100/0x560 [ 454.699910] ? __lockdep_init_map+0x100/0x560 [ 454.704383] mount_fs+0x92/0x2a0 [ 454.707726] vfs_kern_mount.part.0+0x5b/0x3c0 [ 454.712197] do_mount+0x3c9/0x25e0 [ 454.715708] ? copy_mount_string+0x40/0x40 [ 454.719915] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 454.724733] ? copy_mnt_ns+0x8a0/0x8a0 [ 454.728597] ? copy_mount_options+0x1ec/0x2e0 [ 454.733062] ? copy_mnt_ns+0x8a0/0x8a0 [ 454.736921] SyS_mount+0xa8/0x120 [ 454.740367] ? copy_mnt_ns+0x8a0/0x8a0 [ 454.744230] do_syscall_64+0x1d5/0x640 [ 454.748097] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 454.753259] RIP: 0033:0x45f57a [ 454.756433] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 454.764127] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 454.771372] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 454.778614] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 06:02:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r4 = dup3(r2, r0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)={r4, 0x9, 0x2, "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"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 454.785856] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 454.793096] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:51 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 454.905855] FAULT_INJECTION: forcing a failure. [ 454.905855] name failslab, interval 1, probability 0, space 0, times 0 [ 454.921943] CPU: 0 PID: 9525 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 454.929817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.939171] Call Trace: [ 454.941773] dump_stack+0x1b2/0x283 [ 454.945398] should_fail.cold+0x10a/0x154 [ 454.949541] should_failslab+0xd6/0x130 [ 454.953506] __kmalloc+0x2c1/0x400 [ 454.957029] ? match_strdup+0x58/0xa0 [ 454.960803] match_strdup+0x58/0xa0 [ 454.964403] btrfs_parse_early_options+0x241/0x310 [ 454.969316] ? __lock_acquire+0x655/0x42a0 [ 454.973528] ? btrfs_kill_super+0x540/0x540 [ 454.977818] ? lock_acquire+0x170/0x3f0 [ 454.981761] ? trace_hardirqs_on+0x10/0x10 [ 454.985970] ? pcpu_alloc+0x86f/0xf70 [ 454.989747] ? __mutex_lock+0x2cb/0x1430 [ 454.993781] ? kstrdup_const+0x35/0x60 [ 454.997640] btrfs_mount+0x119/0x2838 [ 455.001412] ? lock_downgrade+0x6e0/0x6e0 [ 455.005535] ? _find_next_bit+0xdb/0x100 [ 455.009573] ? pcpu_alloc+0x37d/0xf70 [ 455.013345] ? btrfs_remount+0x10c0/0x10c0 [ 455.017558] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 455.022987] ? rcu_read_lock_sched_held+0x10a/0x130 [ 455.027978] ? pcpu_alloc+0xe1/0xf70 [ 455.031663] ? pcpu_find_block_fit+0x380/0x380 [ 455.036213] ? __lockdep_init_map+0x100/0x560 [ 455.040684] ? __lockdep_init_map+0x100/0x560 [ 455.045153] mount_fs+0x92/0x2a0 [ 455.048516] vfs_kern_mount.part.0+0x5b/0x3c0 [ 455.052991] vfs_kern_mount+0x3c/0x60 [ 455.056770] btrfs_mount+0x2a0/0x2838 [ 455.060551] ? _find_next_bit+0xdb/0x100 [ 455.064587] ? pcpu_alloc+0x37d/0xf70 [ 455.068366] ? btrfs_remount+0x10c0/0x10c0 [ 455.072586] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 455.078015] ? rcu_read_lock_sched_held+0x10a/0x130 [ 455.083004] ? pcpu_alloc+0xe1/0xf70 [ 455.086690] ? pcpu_find_block_fit+0x380/0x380 [ 455.091259] ? __lockdep_init_map+0x100/0x560 [ 455.095739] ? __lockdep_init_map+0x100/0x560 [ 455.100202] mount_fs+0x92/0x2a0 [ 455.103540] vfs_kern_mount.part.0+0x5b/0x3c0 [ 455.108007] do_mount+0x3c9/0x25e0 [ 455.111519] ? copy_mount_string+0x40/0x40 [ 455.115721] ? copy_mount_options+0x17d/0x2e0 [ 455.120183] ? copy_mount_options+0x18f/0x2e0 [ 455.124647] ? copy_mount_options+0x1ec/0x2e0 [ 455.129110] ? copy_mnt_ns+0x8a0/0x8a0 [ 455.132974] SyS_mount+0xa8/0x120 [ 455.136421] ? copy_mnt_ns+0x8a0/0x8a0 [ 455.140302] do_syscall_64+0x1d5/0x640 [ 455.144165] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 455.149325] RIP: 0033:0x45f57a 06:02:51 executing program 1: r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = dup(r0) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f00000000c0)={0x5, 0x7fffffff}) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r2, 0x80006) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000080)) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, 0x140d, 0x200, 0x70bd27, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4004811}, 0x4004004) r3 = socket(0x11, 0x800000003, 0x8) finit_module(r3, &(0x7f0000000180)='bbr\x00', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r4 = accept4$nfc_llcp(r3, &(0x7f0000000240), &(0x7f0000000340)=0x60, 0x800) fchmod(r4, 0x11) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 455.152485] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 455.160166] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 455.167413] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 455.174677] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 455.181914] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 455.189154] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:51 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 455.289390] FAULT_INJECTION: forcing a failure. [ 455.289390] name failslab, interval 1, probability 0, space 0, times 0 [ 455.305430] CPU: 1 PID: 9541 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 455.313219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.322554] Call Trace: [ 455.325128] dump_stack+0x1b2/0x283 [ 455.328754] should_fail.cold+0x10a/0x154 [ 455.332886] should_failslab+0xd6/0x130 [ 455.336831] __kmalloc_track_caller+0x2bc/0x400 [ 455.341469] ? kstrdup_const+0x35/0x60 [ 455.345334] ? lock_downgrade+0x6e0/0x6e0 [ 455.349464] kstrdup+0x36/0x70 [ 455.352669] kstrdup_const+0x35/0x60 [ 455.356364] alloc_vfsmnt+0xe0/0x7c0 [ 455.360249] vfs_kern_mount.part.0+0x27/0x3c0 [ 455.364735] vfs_kern_mount+0x3c/0x60 [ 455.368512] btrfs_mount+0x2a0/0x2838 [ 455.372287] ? _find_next_bit+0xdb/0x100 [ 455.376318] ? pcpu_alloc+0x37d/0xf70 [ 455.380102] ? btrfs_remount+0x10c0/0x10c0 [ 455.384323] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 455.389756] ? rcu_read_lock_sched_held+0x10a/0x130 [ 455.394740] ? pcpu_alloc+0xe1/0xf70 [ 455.398426] ? pcpu_find_block_fit+0x380/0x380 [ 455.402979] ? __lockdep_init_map+0x100/0x560 [ 455.407444] ? __lockdep_init_map+0x100/0x560 [ 455.411917] mount_fs+0x92/0x2a0 [ 455.415272] vfs_kern_mount.part.0+0x5b/0x3c0 [ 455.419754] do_mount+0x3c9/0x25e0 [ 455.423308] ? copy_mount_string+0x40/0x40 [ 455.427544] ? copy_mount_options+0x140/0x2e0 [ 455.432029] ? __sanitizer_cov_trace_pc+0x4a/0x50 [ 455.436856] ? copy_mount_options+0x1ec/0x2e0 [ 455.441340] ? copy_mnt_ns+0x8a0/0x8a0 [ 455.445216] SyS_mount+0xa8/0x120 [ 455.448658] ? copy_mnt_ns+0x8a0/0x8a0 [ 455.452537] do_syscall_64+0x1d5/0x640 [ 455.456422] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 455.461610] RIP: 0033:0x45f57a [ 455.464770] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 455.472446] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 455.479686] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 455.486923] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 455.494160] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 455.501398] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x321440, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r3, 0x80006) ioctl$USBDEVFS_SETINTERFACE(r3, 0x80085504, &(0x7f0000000100)={0xa, 0x100}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="0100e6ff", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r4, 0x8, 0x4000}, 0x8) 06:02:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000180)={0xacd4, 0x3f, 0x20}, 0xc) r4 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r4) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) pwrite64(r2, &(0x7f0000000080)="04f411a697f95c583dd5280b8e0d5d48c86b94432557153c6c12ebd69f6823831a1f138f09aae5271a2765768a5999ddc6f791939e884218eb4b17a19dc9315bc7f118eb6be9bf78b672cf990056d9ea375230f66f7323135de65b4dee083d3448db2d4dfe15fe40e19fcd637dc461e01e1f4dc57f3d47d0ddbe99eaddb2417f4cba110a02a3204b65587d480f5bec2b505aa399f301b0144f47f495eda687b0204187ac1c696b1d64b0bbc89cee2d6d1dc6135d048b88ba8c9fa0fd51f1071f69305d54a6ffa8768bb9c4562b34de6532a09a0be48318460b9c1db23202426f2524c47b9c42131f024d1164", 0xec, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x200000, 0x0) 06:02:52 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:52 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000080), 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x48001, 0x0) [ 455.634579] FAULT_INJECTION: forcing a failure. [ 455.634579] name failslab, interval 1, probability 0, space 0, times 0 [ 455.654351] CPU: 0 PID: 9559 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 455.662155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.671497] Call Trace: [ 455.674079] dump_stack+0x1b2/0x283 [ 455.677702] should_fail.cold+0x10a/0x154 [ 455.681861] should_failslab+0xd6/0x130 [ 455.685811] __kmalloc_track_caller+0x2bc/0x400 [ 455.690455] ? btrfs_parse_early_options+0xa3/0x310 [ 455.695462] kstrdup+0x36/0x70 [ 455.698629] btrfs_parse_early_options+0xa3/0x310 [ 455.703453] ? __lock_acquire+0x655/0x42a0 [ 455.707659] ? btrfs_kill_super+0x540/0x540 [ 455.711958] ? lock_acquire+0x170/0x3f0 [ 455.715904] ? pcpu_alloc+0x86f/0xf70 [ 455.719694] ? trace_hardirqs_on+0x10/0x10 [ 455.723896] ? pcpu_alloc+0x86f/0xf70 [ 455.728106] ? __mutex_lock+0x2cb/0x1430 [ 455.732141] ? kstrdup_const+0x35/0x60 [ 455.736011] btrfs_mount+0x119/0x2838 [ 455.739783] ? lock_downgrade+0x6e0/0x6e0 [ 455.743904] ? _find_next_bit+0xdb/0x100 [ 455.747938] ? pcpu_alloc+0x37d/0xf70 [ 455.751712] ? btrfs_remount+0x10c0/0x10c0 [ 455.755934] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 455.761364] ? rcu_read_lock_sched_held+0x10a/0x130 [ 455.766354] ? pcpu_alloc+0xe1/0xf70 [ 455.770050] ? pcpu_find_block_fit+0x380/0x380 [ 455.774617] ? __lockdep_init_map+0x100/0x560 [ 455.779092] ? __lockdep_init_map+0x100/0x560 [ 455.783561] mount_fs+0x92/0x2a0 [ 455.786906] vfs_kern_mount.part.0+0x5b/0x3c0 [ 455.791377] vfs_kern_mount+0x3c/0x60 [ 455.795152] btrfs_mount+0x2a0/0x2838 [ 455.798926] ? check_preemption_disabled+0x35/0x240 [ 455.803919] ? btrfs_remount+0x10c0/0x10c0 [ 455.808149] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 455.813572] ? rcu_read_lock_sched_held+0x10a/0x130 [ 455.818566] ? pcpu_alloc+0xe1/0xf70 [ 455.822258] ? pcpu_find_block_fit+0x380/0x380 [ 455.826816] ? __lockdep_init_map+0x100/0x560 [ 455.831290] ? __lockdep_init_map+0x100/0x560 [ 455.835762] mount_fs+0x92/0x2a0 [ 455.839104] vfs_kern_mount.part.0+0x5b/0x3c0 [ 455.843575] do_mount+0x3c9/0x25e0 [ 455.847110] ? copy_mount_string+0x40/0x40 [ 455.851321] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 455.856138] ? copy_mnt_ns+0x8a0/0x8a0 [ 455.860002] ? copy_mount_options+0x1ec/0x2e0 [ 455.864557] ? copy_mnt_ns+0x8a0/0x8a0 [ 455.868421] SyS_mount+0xa8/0x120 [ 455.871849] ? copy_mnt_ns+0x8a0/0x8a0 [ 455.875716] do_syscall_64+0x1d5/0x640 [ 455.879580] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 455.884740] RIP: 0033:0x45f57a [ 455.887904] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 455.895585] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 455.902826] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 455.910069] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 455.917312] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 455.924567] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:52 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x187a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) chown(&(0x7f0000000240)='./file0\x00', r2, r4) r5 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r5) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) sendto$inet(r0, &(0x7f0000000480)="998ea013a212512493f76a13ca0975aa818a888f5af3679b4e65b77c52ad29f8040118b0e5e60d174e40ffbd73f6a4aeb5e2f3642468c0688896ec0a1a98faf10bddd0ddf341c2a4fa6379e033ff04222b600fab4c97f34d75d1de1bbfc4a71af049579636ddeb7e0460dc991482849aa317f1f475a2e760dbd5d8077b78ecff7757a52e56d1c8faa97741fbdf9ae23f6a5874cce604b402363b6dd8e1001e51e33bafbc9c0224d0423671e8b5316ef39df1e0a2a002beb01b1449f422a2d629370584191c8c4c7a92535fe310864e9a27fc6e5b", 0xd4, 0x50, &(0x7f0000000200)={0x2, 0x4e23, @remote}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) recvmsg$kcm(r1, &(0x7f0000001c40)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001780)=""/119, 0x77}, {&(0x7f0000001900)=""/186, 0xba}, {&(0x7f00000019c0)=""/162, 0xa2}, {&(0x7f0000001800)=""/46, 0x2e}, {&(0x7f0000001a80)=""/170, 0xaa}, {&(0x7f0000001b40)=""/43, 0x2b}], 0x6, &(0x7f0000001c00)=""/31, 0x1f}, 0x60) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r2, 0x80006) r3 = openat(r2, &(0x7f0000001600)='./file0\x00', 0x2c02, 0x10) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000001640)={0x1, [0x0]}) sendmsg$nfc_llcp(r0, &(0x7f0000001740)={&(0x7f0000000080)={0x27, 0x1, 0x1, 0x2, 0x5, 0x1, "2058ce43e2488124626f0ed80923f51809ed9f9d69b8265e2d9625c940812d2caeca0eacd9854f68c28f2b12995ec2b2316cc3db72d6fec360a0768804988d", 0x34}, 0x60, &(0x7f0000000140)=[{&(0x7f0000000100)="06497fffef34279fe7856275fbbe1cf3ec440b1c635393c122b3f82871aac6cca95b4af2b8627d0f7ddd4446", 0x2c}, {&(0x7f0000000340)="581b4b74dc1a975e06cc507bc3d2937d5cfae6688deb9cbeb8a169316a0ffbd78d5fd91ab59abe4a40a3acd6d207731ecb9c9c87a74e2ce38ea097d75148f886feba61c1a3219e170e6f67bbdfab0591a4b170bec950c00deb31bafaacff991e459da4e2cd4e0a409a76d35a72adab50ccf8c35a9c605dda55594c1c3e0d7df19987a3a8880898fc8737f5face64dbcb374e5674adc72b8f1210eabf62159be34a35c4c1c40166914c89c4722f5c689ba75523c45c2e57c6a6f4adb1744c845cf44121407ee457409b909536a99670", 0xcf}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001840)="09f09ae7174491108ac47765b1d988804f1b4db61ce203bb11caf906e2f4451e20040d6ae6c7c5094e75337ec434a49179e00ced5be308aed23f8fb51ebecb8823f8857657d682ac84683324db7687ce23c980b505ac6f21d07bfd1093aacbf9a5d5348137ac3ac44aca77a915c407d6263aa6fa23583fe682bb4b62c20436d14e904877da5fc4df0f2f08e27d509d0805b1b8d2bfd1dc5fcc95aa74c99ff72208b3480e7ddf12600b9997818e9a6f019f2fd12b3e5ecf", 0xb7}, {&(0x7f0000001440)="d234181c269d9e7146d93e99ddb12a93835cdf33b3b68b35581ee24e5798ca28ead7acff865853de12202b2603f5332dccd48c43e5777523aac06712d08aaf6ccad07efb109358daa35cff8cc0fa8153441ef84a9fa815b33b33fb6e5312f9efbee5edd16b40c9f32e70400046fd401f20bb82d9eb72631a317e4d66f620650c28fff46437668def495965de653762d3df7c7008b1f37e3eb211ce0dab615fd5a6a97e1ebca08033aee297f61b55d7559ce79904ffd555b5e4ff80914b05c8b099f7cde373a2644b5bafdb8a9bfafeb3f64abf2842b7d699d20aca8d6e0facc69a04ae5c1eb11e7f99ed707f", 0xec}, {&(0x7f0000001540)="f38b3420e5743d780b2fa22d1664c46c82db9f85d2829c396ce846785bc3c31b53ccac2156b5a777e3abb3f24949ae1cbe2d662edc7d59dcc6083834165c27ac1fa4f3c91aefaede8a45884827ef61c7c4919ce4167c0e6c15eef738a26377a823c664c2dc43ac381923ee79c6e6baed336866b1a4715b55d91bc68e978ccd6633ecb024c137954863d10d898d7c3b0ca4a478783b539a7095ffeb66ad877febda3a64ea6516f2", 0xa7}], 0x6, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x108, 0x20000000}, 0x4000804) [ 456.118900] FAULT_INJECTION: forcing a failure. [ 456.118900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 456.142869] CPU: 0 PID: 9590 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 456.150679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.160020] Call Trace: [ 456.162612] dump_stack+0x1b2/0x283 [ 456.166245] should_fail.cold+0x10a/0x154 [ 456.170526] __alloc_pages_nodemask+0x22b/0x2730 [ 456.175282] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 456.180387] ? debug_object_activate+0x450/0x450 [ 456.185140] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 456.189970] ? btrfs_parse_early_options+0x19d/0x310 [ 456.195064] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 456.200085] ? __lock_acquire+0x655/0x42a0 [ 456.204314] ? btrfs_kill_super+0x540/0x540 [ 456.208625] ? lock_acquire+0x170/0x3f0 [ 456.212583] alloc_pages_current+0xe7/0x1e0 [ 456.216878] ? trace_hardirqs_on+0x10/0x10 [ 456.221085] __get_free_pages+0xb/0x40 [ 456.224946] parse_security_options+0x1a/0x90 [ 456.229426] btrfs_mount+0x502/0x2838 [ 456.233223] ? _find_next_bit+0xdb/0x100 [ 456.237379] ? pcpu_alloc+0x37d/0xf70 [ 456.241165] ? btrfs_remount+0x10c0/0x10c0 [ 456.245395] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 456.250940] ? rcu_read_lock_sched_held+0x10a/0x130 [ 456.255940] ? pcpu_alloc+0xe1/0xf70 [ 456.259651] ? __lockdep_init_map+0x100/0x560 [ 456.264133] ? __lockdep_init_map+0x100/0x560 [ 456.268624] mount_fs+0x92/0x2a0 [ 456.271998] vfs_kern_mount.part.0+0x5b/0x3c0 [ 456.276477] vfs_kern_mount+0x3c/0x60 [ 456.280257] btrfs_mount+0x2a0/0x2838 [ 456.284048] ? _find_next_bit+0xdb/0x100 [ 456.288097] ? pcpu_alloc+0x37d/0xf70 [ 456.291894] ? btrfs_remount+0x10c0/0x10c0 [ 456.296114] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 456.301538] ? rcu_read_lock_sched_held+0x10a/0x130 [ 456.306525] ? pcpu_alloc+0xe1/0xf70 [ 456.310218] ? pcpu_find_block_fit+0x380/0x380 [ 456.314772] ? __lockdep_init_map+0x100/0x560 [ 456.319238] ? __lockdep_init_map+0x100/0x560 [ 456.323715] mount_fs+0x92/0x2a0 [ 456.327074] vfs_kern_mount.part.0+0x5b/0x3c0 [ 456.331557] do_mount+0x3c9/0x25e0 [ 456.335074] ? copy_mount_string+0x40/0x40 [ 456.339385] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 456.344198] ? copy_mnt_ns+0x8a0/0x8a0 [ 456.348057] ? copy_mount_options+0x1ec/0x2e0 [ 456.352522] ? copy_mnt_ns+0x8a0/0x8a0 [ 456.356381] SyS_mount+0xa8/0x120 [ 456.359817] ? copy_mnt_ns+0x8a0/0x8a0 [ 456.363699] do_syscall_64+0x1d5/0x640 [ 456.367562] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 456.372740] RIP: 0033:0x45f57a [ 456.375899] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 456.383588] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 456.390832] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 456.398077] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 456.405328] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 456.412584] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) creat(0x0, 0x0) 06:02:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) utimes(&(0x7f0000000080)='\x00', &(0x7f00000000c0)={{0x0, 0xea60}, {0x77359400}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x24200, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) getpeername(r0, &(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, &(0x7f0000000180)=0x80) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @private=0xa010101}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) recvfrom(r3, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000100)={{0x2, 0x4e23, @rand_addr=0x64010102}, {0x1, @dev={[], 0xa}}, 0x4, {0x2, 0x4e22, @broadcast}, 'veth0_to_hsr\x00'}) 06:02:53 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141202, 0x100) ftruncate(r1, 0x80006) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x800, @empty, 0xffff}, 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_TIMERSLACK(0x1e) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x62fee75f8986424c, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r4, r5, 0x0, 0xff7ffffe) ioctl$KDSETLED(r5, 0x4b32, 0x8) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000140)=0x4) [ 456.594119] FAULT_INJECTION: forcing a failure. [ 456.594119] name failslab, interval 1, probability 0, space 0, times 0 [ 456.606857] CPU: 1 PID: 9624 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 456.614654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.624014] Call Trace: [ 456.626588] dump_stack+0x1b2/0x283 [ 456.630205] should_fail.cold+0x10a/0x154 [ 456.634335] should_failslab+0xd6/0x130 [ 456.638285] __kmalloc+0x2c1/0x400 [ 456.641799] ? match_strdup+0x58/0xa0 [ 456.645576] match_strdup+0x58/0xa0 [ 456.649177] btrfs_parse_early_options+0x241/0x310 [ 456.654076] ? __lock_acquire+0x655/0x42a0 [ 456.658372] ? btrfs_kill_super+0x540/0x540 [ 456.662665] ? lock_acquire+0x170/0x3f0 [ 456.666615] ? trace_hardirqs_on+0x10/0x10 [ 456.670826] ? pcpu_alloc+0x86f/0xf70 [ 456.674602] ? __mutex_lock+0x2cb/0x1430 [ 456.678635] ? kstrdup_const+0x35/0x60 [ 456.682496] btrfs_mount+0x119/0x2838 [ 456.686272] ? lock_downgrade+0x6e0/0x6e0 [ 456.690392] ? _find_next_bit+0xdb/0x100 [ 456.694425] ? pcpu_alloc+0x37d/0xf70 [ 456.698204] ? btrfs_remount+0x10c0/0x10c0 [ 456.702418] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 456.707843] ? rcu_read_lock_sched_held+0x10a/0x130 [ 456.712829] ? pcpu_alloc+0xe1/0xf70 [ 456.716522] ? pcpu_find_block_fit+0x380/0x380 [ 456.721077] ? __lockdep_init_map+0x100/0x560 [ 456.725546] ? __lockdep_init_map+0x100/0x560 [ 456.730019] mount_fs+0x92/0x2a0 [ 456.733364] vfs_kern_mount.part.0+0x5b/0x3c0 [ 456.737850] vfs_kern_mount+0x3c/0x60 [ 456.741622] btrfs_mount+0x2a0/0x2838 [ 456.745393] ? _find_next_bit+0xdb/0x100 [ 456.749424] ? pcpu_alloc+0x37d/0xf70 [ 456.753196] ? btrfs_remount+0x10c0/0x10c0 [ 456.757408] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 456.762843] ? rcu_read_lock_sched_held+0x10a/0x130 [ 456.767829] ? pcpu_alloc+0xe1/0xf70 [ 456.771518] ? pcpu_find_block_fit+0x380/0x380 [ 456.776070] ? __lockdep_init_map+0x100/0x560 [ 456.780535] ? __lockdep_init_map+0x100/0x560 [ 456.785005] mount_fs+0x92/0x2a0 [ 456.788347] vfs_kern_mount.part.0+0x5b/0x3c0 [ 456.792815] do_mount+0x3c9/0x25e0 [ 456.796330] ? copy_mount_string+0x40/0x40 [ 456.800538] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 456.805353] ? copy_mnt_ns+0x8a0/0x8a0 [ 456.809217] ? copy_mount_options+0x1ec/0x2e0 [ 456.813685] ? copy_mnt_ns+0x8a0/0x8a0 [ 456.817559] SyS_mount+0xa8/0x120 [ 456.820984] ? copy_mnt_ns+0x8a0/0x8a0 [ 456.824848] do_syscall_64+0x1d5/0x640 [ 456.828714] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 456.833876] RIP: 0033:0x45f57a [ 456.837037] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 456.844719] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 456.851967] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 456.859222] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 456.866466] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 456.873710] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:53 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000000c0)={0x0, 0x74c, 0x7}) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x80006) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000400)={0x81, "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"}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x100, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='team0\x00', 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e24, @empty}], 0x10) flistxattr(r0, &(0x7f0000000200)=""/178, 0xb2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000640)={r5, 0x8, 0x401}, &(0x7f0000000680)=0x8) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x8239e4534518a8d6, 0x0) getpeername$packet(r6, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) 06:02:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x8d}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000000200)=[@ip_retopts={{0x0, 0x0, 0x7, {[@ra={0x94, 0x0, 0x1}, @timestamp={0x44, 0x0, 0xed, 0x0, 0x8, [0x20]}, @noop, @end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:53 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080)="aed3d3857406c53d20970c7e3b6d1137da7f036c888ad945e6b3e4e5571cecfc9fe3dfc5b5e250dfa387fc2b66baa6aa26308290061f46874f282e20c4aab291f6fec31d0d88b6dc1285d0c5802222f606fba7b05dbba6be8a3c3e92ba64e357a26b4e792ae04f34db", &(0x7f0000000100)=""/31}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket(0x11, 0x800000003, 0x8) finit_module(r3, &(0x7f0000000240), 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) gettid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r5, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r4, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 457.055254] FAULT_INJECTION: forcing a failure. [ 457.055254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 457.079924] CPU: 0 PID: 9648 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 457.087723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.097062] Call Trace: [ 457.099637] dump_stack+0x1b2/0x283 [ 457.103260] should_fail.cold+0x10a/0x154 [ 457.107403] __alloc_pages_nodemask+0x22b/0x2730 [ 457.112157] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 457.117257] ? debug_object_activate+0x450/0x450 [ 457.122024] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 457.126876] ? btrfs_parse_early_options+0x19d/0x310 [ 457.131974] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 457.137005] ? __lock_acquire+0x655/0x42a0 [ 457.141243] ? btrfs_kill_super+0x540/0x540 [ 457.145569] ? lock_acquire+0x170/0x3f0 [ 457.149537] alloc_pages_current+0xe7/0x1e0 [ 457.153856] ? trace_hardirqs_on+0x10/0x10 [ 457.158079] __get_free_pages+0xb/0x40 [ 457.161952] parse_security_options+0x1a/0x90 [ 457.166459] btrfs_mount+0x502/0x2838 [ 457.170257] ? _find_next_bit+0xdb/0x100 [ 457.174303] ? pcpu_alloc+0x37d/0xf70 [ 457.178087] ? btrfs_remount+0x10c0/0x10c0 [ 457.181777] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 457.182314] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 457.196303] ? rcu_read_lock_sched_held+0x10a/0x130 [ 457.201310] ? pcpu_alloc+0xe1/0xf70 [ 457.205023] ? __lockdep_init_map+0x100/0x560 [ 457.209606] ? __lockdep_init_map+0x100/0x560 [ 457.214092] mount_fs+0x92/0x2a0 [ 457.217452] vfs_kern_mount.part.0+0x5b/0x3c0 [ 457.220688] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 457.221951] vfs_kern_mount+0x3c/0x60 [ 457.221963] btrfs_mount+0x2a0/0x2838 [ 457.221977] ? _find_next_bit+0xdb/0x100 [ 457.221987] ? pcpu_alloc+0x37d/0xf70 [ 457.221997] ? btrfs_remount+0x10c0/0x10c0 [ 457.222016] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 457.255597] ? rcu_read_lock_sched_held+0x10a/0x130 [ 457.260610] ? pcpu_alloc+0xe1/0xf70 [ 457.264411] ? pcpu_find_block_fit+0x380/0x380 [ 457.268985] ? __lockdep_init_map+0x100/0x560 [ 457.273479] ? __lockdep_init_map+0x100/0x560 [ 457.277968] mount_fs+0x92/0x2a0 [ 457.281319] vfs_kern_mount.part.0+0x5b/0x3c0 [ 457.285791] do_mount+0x3c9/0x25e0 [ 457.289308] ? copy_mount_string+0x40/0x40 [ 457.293529] ? copy_mount_options+0x140/0x2e0 [ 457.297999] ? __sanitizer_cov_trace_pc+0x4a/0x50 [ 457.302818] ? copy_mount_options+0x1ec/0x2e0 [ 457.307288] ? copy_mnt_ns+0x8a0/0x8a0 [ 457.311151] SyS_mount+0xa8/0x120 [ 457.314574] ? copy_mnt_ns+0x8a0/0x8a0 [ 457.318436] do_syscall_64+0x1d5/0x640 [ 457.322309] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 457.327474] RIP: 0033:0x45f57a [ 457.330635] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 457.338316] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 457.345557] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 06:02:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000005c0)=[{{&(0x7f0000000200)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @bcast, @bcast]}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000380)="fe723abcd01c9d64aaec238ace7978e07b1fa8dd4b3a09efa11367cdccc56e2339ed1b05fa8d94fcec73ec44dfcb885908317dfa53ff97331975bb10d38f4cfab520da6545744ebf540f040225d8cb5ca3c8291d6b0d97292700efbe30c6df66949332dfd2b667ce49c94c6153e43c4dba01fd59e53555c3e60fd682c977", 0x7e}, {&(0x7f0000000480)="4f3361941fa8c98c61be533cc098ddc1c21e7e7a4e889851eab7dc1cc5bc987eae24ff4226bbc521da61aafbdf8e004237899a8cafc1f0fc208eca511f9b1f0c57235af245c8f3c91b75e51f2299898caf3d338e8766fda96c63b3191cdd7baa3fe30cb9dd79057827a576e65c838887c8973d3d45cfe359ce40f408a8bb1060b3c00f062c56b94b8357e61b7c7c92b79857e4af9c39dbf7968e5ffd1b12028c06695eb02e30", 0xa6}, {&(0x7f0000000280)="ee5aad6675ef1ce60fe11a8b4754d7a15b", 0x11}, {&(0x7f0000000640)="76f1a9a61f6f98ada5fc9f2d797955fcca49af355237f2b35f79eacd12b06545234663f6889cc4dbaaf748a05802a580168e53ff5b47ed7541a68193b250876d140a67426761b61b7e9d4df52a33e6b178147296d8ba65e928928a1ac34397e515f4d520283aca844a86d206ca3762c6446b4a0bcdecf7cc772c1bcdecaac7f26cf2bfda2f08a17e421d469951f80deb57f9e51a0d1a4d5029e21651a1c63c488bc39a6ff8b3c412bce97cfedb255d7c0514c0ff250289ca91178cf447e5259dfdc513f6f392619ac32433c8befe3694b1b0e2547067449c068dd8824b79a109c9e30d0ec7f859520f8744ce42", 0xed}, {&(0x7f0000000740)="e3706ce7c8b789bf227508f5a48b70b4548d6bdbf08933b9b48ccd9b7f5eebaf5c6b6a858d1a0ed8549217b14e992f097ac9bceaf122548f170a650e58e12add269f650bd3d4d6cdcb4c0ab06d25c813a34f7c6e0556d581", 0x58}, {&(0x7f0000000540)="6ed8911b10c71c3be43cba604e4f98130806fec333ab2e344cfb", 0x1a}], 0x6}}], 0x1, 0x8800) 06:02:53 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x408000, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000a80)='mptcp_pm\x00') r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ftruncate(0xffffffffffffffff, 0x80006) statx(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x8, &(0x7f0000000640)) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000c00)=@newtfilter={0x89c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x86c, 0x2, [@TCA_BASIC_ACT={0x818, 0x3, [@m_csum={0x150, 0x1a, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x80000001, 0x604, 0x1, 0x2, 0x7}, 0x74}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x80, 0x4, 0x10000000, 0xfffffffd, 0x80000000}, 0x6c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x0, 0x1, 0x1000, 0x800}, 0x4d}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xfff, 0x2, 0x4, 0x1000, 0x3}, 0x3}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xcf57, 0x80000001, 0xffffffffcffffff9, 0x8000, 0x3}, 0x61}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xfff, 0xd851, 0x3, 0x8, 0x101}, 0x6a}}]}, {0x79, 0x6, "ad4137a3a534cc9587a05f6fdf6755823992a9d8da2c6cf4ecb051a38b9055f5545aed634cf5f153903acea504210216df9fdeaff643b55edbf2089153da2a9caa32256aed862867e8d5a5aff026d5abe77c9f6f424b79ff49f72045048f152ddf93fdd61d8eeab2f25bb42a670be9f18ad2cf11b2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ctinfo={0x140, 0x17, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x3}, @TCA_CTINFO_ACT={0x18, 0x3, {0x1, 0x9, 0x6, 0x9, 0x5}}]}, {0xf3, 0x6, "ec77cfbe99a53c8b9934a923f48443b1240c5eb51ddc967bd6416bfeb905b459420c3b6bdf4bfd118a287fa9720b1a9971d095c317aa382fbfdcd9ceeb89c32655054ee18452bddfd8fd1c3d8889de0a5ec7d66642c3c17d9c150ae7890d6048c77f7700ee2d56b6c05049d91b41217db5efdfdf7ceb8942406b240b8fe3061becf268b494af4a918b851d5b68f1ae069155ab421fccf04fc759363e07df66eadf077c08e808abf48a12c6da19f5406cb7d6c85a32df4b072783961e88946ca751a90ad06c61ea58763b5b00961f9f5fe300e0943bb8b0ecdbc5d1903202988efea870d4614adb1af0d5a8857be816"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_police={0x584, 0x8, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x470, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0xffffff00, 0xfffffffffffffffe, 0x2, 0x4, 0x80000001, {0x5, 0x2, 0x80, 0xffff, 0x3, 0x400}, {0xd5, 0x0, 0x3, 0x1, 0x9, 0x5}, 0x7, 0x370, 0x4}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x3b8}, @TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_RESULT={0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1a8, 0x2, 0x8, 0x7, 0x6, 0x3ff, 0x9ab9, 0x4, 0x1, 0x6, 0xc5, 0x2059, 0x8001, 0x0, 0x41d8, 0x3, 0x0, 0x2, 0x4, 0x1, 0x8001, 0xffffff80, 0x0, 0x6, 0x6, 0x9, 0x689d76f2, 0x1f, 0x7a, 0x0, 0x4, 0x1, 0x1, 0x3, 0x7cb, 0xfffffbff, 0x20, 0x7fffffff, 0xae0, 0x8, 0xffffff79, 0x1, 0x4, 0x5, 0x800, 0x3e21, 0x8001, 0xfff, 0xfffffffc, 0x5, 0x2, 0x3, 0xca, 0x7fffffff, 0xffff, 0xc00000, 0xcea4, 0x4, 0x2, 0x2, 0xc686, 0xffffffff, 0x9, 0x9, 0xfffffffd, 0x44c, 0x3, 0x10000, 0x57, 0x1, 0x8000, 0x7, 0x6, 0x80000001, 0x5, 0x4, 0x2c, 0x5, 0x4, 0x3ff, 0x1, 0x2, 0x8, 0x200, 0x54cdcfaa, 0x9, 0x2, 0x8001, 0x6fa, 0x2, 0x20, 0x0, 0x7fff, 0x547, 0x6, 0x1, 0x985, 0x6, 0x0, 0x0, 0x8, 0x2a203875, 0x1, 0x0, 0x400, 0x15, 0xca9, 0x544b, 0x7f, 0x1, 0x8, 0x6, 0x6, 0x1f, 0x5, 0x0, 0x0, 0x1, 0x2, 0x6, 0x1, 0x7ff, 0x80000001, 0xfffff800, 0x65, 0x5, 0x398, 0x1, 0xdd8f, 0x3, 0x80000001, 0xa05, 0x100000, 0x7, 0x76, 0x4, 0x3, 0x3, 0x0, 0x8, 0x861, 0x2, 0xe3f2, 0x2, 0x40, 0x10000, 0x100, 0x679c, 0x3, 0xffffffff, 0x1f3eb990, 0x81, 0xe4, 0x2, 0x0, 0x400, 0x20000, 0x4e59, 0x8, 0x29, 0x8000, 0x6, 0x2, 0x3e2, 0xf9, 0xde, 0xd1b6, 0x1, 0x0, 0xffff0951, 0x5, 0x9, 0x6, 0x5, 0x1, 0x3c77ad30, 0xfffffffb, 0x7, 0x7, 0x2, 0x0, 0x1, 0x0, 0x80000001, 0x1, 0x7, 0x1, 0x3f, 0x1, 0x7bde, 0x200, 0x4, 0x7, 0x1f, 0x175, 0xff, 0x82, 0xab4, 0x7, 0x2, 0x3f, 0x7f, 0x7, 0x80000001, 0x200, 0x1, 0x11, 0x3, 0x5, 0x3, 0xa3c0000, 0x8, 0x100, 0x3494, 0x5, 0xe, 0x2, 0x3f9, 0xe7cb, 0xbca3, 0x10000, 0x9, 0xe599, 0x1ff, 0xe8e2, 0x8885, 0x3, 0x3, 0x6a2, 0x4, 0x0, 0x80, 0xeb, 0x8, 0x0, 0xfff, 0x342, 0xf76, 0x2, 0x4, 0x2, 0x400, 0x3, 0x4, 0x9, 0xfffffff7, 0xe8d7, 0x10000, 0x0, 0x6, 0xfffffffa, 0x80, 0x5, 0x9, 0x10001, 0x6]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x10001}]]}, {0xe9, 0x6, "c2b26c722b19d7bd8f115e93cd3619cd0d4fdbe94fdc6e21b2af38e43b7a08a9dc97b9e86d4aee947d770d15d0e79e4dc3c4221798a8464455b30fa4fcb7d82c146e4ee7377562b75dd2f3972dbddabdb827a795278eb912f8c18075f64f73247abd72dd1c4de455dd04f426ef02f02ade79a2a56e1a99127e18be4683fafa9cd8a769af839878ce86331aca4b95a3899387e3822d865048f68f3f300d09708b358454a31dda013c13f2473edc61001452be22c9a50342005d578921e294edc974d58465b29323a4addf7143fc9d7e39cb739c1929c36d7bd13d2fd70720aa33a30aa611b6"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}]}, @TCA_BASIC_EMATCHES={0x50, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x4c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x101, 0x1, 0x40}, {0x8, 0x7, 0x8000, 0x3, 0x5, 0x1, 0x1}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x7, 0x2, 0x800}, {0x2, 0x2, 0x1, "effe"}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x1467, 0x3, 0x2}, {0x1, 0x6, 0x8, 0x4bf}}}]}]}]}}]}, 0x89c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000bc0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x94, r1, 0x4, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x3e}}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x400c091}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2000880, 0x0) 06:02:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r2, 0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r3, 0x80006) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x2, &(0x7f0000000200)=@raw=[@generic={0xff, 0x5, 0x7, 0x8, 0x1800}, @alu={0x7, 0x1, 0x8, 0x0, 0x4, 0xc}], &(0x7f0000000240)='GPL\x00', 0xd3f5, 0x0, 0x0, 0x41000, 0xb, [], 0x0, 0x20, r1, 0x8, &(0x7f0000000280)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xd, 0x7, 0x3a}, 0x10, r2, r3}, 0x78) 06:02:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) 06:02:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2050009, 0x0) [ 457.352799] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 457.360041] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 457.367287] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e21, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r3 = dup3(r0, r1, 0x80000) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000200)={0x4, {0x9, 0x101, 0xcaff, 0xfff}}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@v1={0x2, 'X'}, 0x2, 0x1) [ 457.568263] print_req_error: I/O error, dev loop4, sector 128 06:02:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000200)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, &(0x7f00000000c0), 0x0, &(0x7f0000000500)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x46, 0x1, 0x4, [{@loopback, 0x1}, {@multicast2, 0x3}, {@multicast2, 0x8}, {@loopback, 0x6}]}, @timestamp={0x44, 0x10, 0x6, 0x0, 0x8, [0x9, 0x65, 0x7ff]}, @lsrr={0x83, 0xb, 0xff, [@broadcast, @multicast1]}, @timestamp={0x44, 0xc, 0x9, 0x0, 0xd, [0x4c7eb1df, 0x7fff]}, @timestamp_addr={0x44, 0x14, 0xf0, 0x1, 0x6, [{@rand_addr=0x64010101, 0x4}, {@loopback, 0xbdd}]}, @lsrr={0x83, 0x7, 0xf9, [@multicast2]}, @lsrr={0x83, 0x17, 0x4e, [@multicast2, @dev={0xac, 0x14, 0x14, 0x1a}, @remote, @empty, @empty]}, @end, @rr={0x7, 0x23, 0x9b, [@empty, @rand_addr=0x64010100, @loopback, @multicast2, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}]}}}, @ip_retopts={{0xd4, 0x0, 0x7, {[@lsrr={0x83, 0x17, 0xf2, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1c}, @remote, @multicast1]}, @rr={0x7, 0x1f, 0xd1, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @empty, @private=0xa010101, @local]}, @ssrr={0x89, 0x1b, 0x7c, [@rand_addr=0x64010102, @loopback, @broadcast, @multicast1, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x1f, 0xa3, [@private=0xa010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast2, @empty, @local, @dev={0xac, 0x14, 0x14, 0x37}]}, @timestamp_prespec={0x44, 0x2c, 0x6a, 0x3, 0x3, [{@broadcast, 0x7fffffff}, {@private=0xa010100, 0x740}, {@rand_addr=0x64010102, 0x2}, {@dev={0xac, 0x14, 0x14, 0x3a}, 0x3}, {@multicast1, 0x5}]}, @noop, @end, @timestamp={0x44, 0x1c, 0xff, 0x0, 0x9, [0x2b, 0x322, 0x8, 0x7, 0x80000001, 0xc5f]}, @timestamp={0x44, 0x8, 0x92, 0x0, 0x7, [0x7]}]}}}], 0x190}, 0x2000c001) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xfe}}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000240)='veth0_to_team\x00') 06:02:54 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f00000000c0)="9f1e0972c910a845", &(0x7f0000000100), 0x4}, 0x20) [ 457.894705] FAULT_INJECTION: forcing a failure. [ 457.894705] name failslab, interval 1, probability 0, space 0, times 0 [ 457.907344] CPU: 1 PID: 9711 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 457.915176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.924526] Call Trace: [ 457.927118] dump_stack+0x1b2/0x283 [ 457.930747] should_fail.cold+0x10a/0x154 [ 457.934895] should_failslab+0xd6/0x130 [ 457.938877] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 457.943540] selinux_parse_opts_str+0x4f8/0xa00 [ 457.948205] ? debug_object_activate+0x450/0x450 [ 457.952965] ? selinux_key_alloc+0x1a0/0x1a0 [ 457.957374] ? selinux_sb_copy_data+0x206/0x380 [ 457.962057] security_sb_parse_opts_str+0x6e/0xa0 [ 457.966981] parse_security_options+0x49/0x90 [ 457.971470] btrfs_mount+0x502/0x2838 [ 457.975271] ? _find_next_bit+0xdb/0x100 [ 457.979322] ? pcpu_alloc+0x37d/0xf70 [ 457.983116] ? btrfs_remount+0x10c0/0x10c0 [ 457.987360] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 457.992805] ? rcu_read_lock_sched_held+0x10a/0x130 [ 457.997812] ? pcpu_alloc+0xe1/0xf70 [ 458.001524] ? __lockdep_init_map+0x100/0x560 [ 458.006007] ? __lockdep_init_map+0x100/0x560 [ 458.010499] mount_fs+0x92/0x2a0 [ 458.013858] vfs_kern_mount.part.0+0x5b/0x3c0 [ 458.018345] vfs_kern_mount+0x3c/0x60 [ 458.022140] btrfs_mount+0x2a0/0x2838 [ 458.025952] ? _find_next_bit+0xdb/0x100 [ 458.030007] ? pcpu_alloc+0x37d/0xf70 [ 458.033797] ? btrfs_remount+0x10c0/0x10c0 [ 458.038024] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 458.043475] ? rcu_read_lock_sched_held+0x10a/0x130 [ 458.048473] ? pcpu_alloc+0xe1/0xf70 [ 458.052174] ? pcpu_find_block_fit+0x380/0x380 [ 458.056732] ? __lockdep_init_map+0x100/0x560 [ 458.061209] ? __lockdep_init_map+0x100/0x560 [ 458.065693] mount_fs+0x92/0x2a0 [ 458.069050] vfs_kern_mount.part.0+0x5b/0x3c0 [ 458.073541] do_mount+0x3c9/0x25e0 [ 458.077078] ? copy_mount_string+0x40/0x40 [ 458.081306] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 458.086144] ? copy_mnt_ns+0x8a0/0x8a0 [ 458.090024] ? copy_mount_options+0x1ec/0x2e0 [ 458.094641] ? copy_mnt_ns+0x8a0/0x8a0 [ 458.098513] SyS_mount+0xa8/0x120 [ 458.101949] ? copy_mnt_ns+0x8a0/0x8a0 [ 458.105814] do_syscall_64+0x1d5/0x640 [ 458.109680] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 458.114842] RIP: 0033:0x45f57a [ 458.118013] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 458.125708] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 458.132958] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 458.140215] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 458.147470] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 458.154727] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x400080) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x2200, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r3, 0xc01864b0, &(0x7f0000000180)={0x3, 0x2, 0xa, 0xf8, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x260501, 0x0) 06:02:54 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') preadv(r2, &(0x7f0000000500), 0x241, 0x0) 06:02:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x110000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) write$FUSE_ENTRY(r1, &(0x7f0000000200)={0x90, 0x0, 0x4, {0x6, 0x0, 0xf1ac, 0xffffffff, 0x1f, 0xc614, {0x3, 0x6, 0x2, 0xd7ab, 0x100000000, 0x3, 0x10004, 0x0, 0x5, 0xfffff7df, 0x5d7, r2, r4, 0x2, 0x1}}}, 0x90) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000340)={0x1, [0xe6]}, &(0x7f0000000380)=0x6) r6 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r5, r6, 0x0, 0xff7ffffe) ioctl$VIDIOC_SUBSCRIBE_EVENT(r6, 0x4020565a, &(0x7f0000000140)={0x1, 0x2, 0x2}) 06:02:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) setxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x51, 0x4, 0x7b, "7be2bec78f3e8b2232e77ac917c337ec", "307b582251ffc35c94b3d99b2f13919026b86b86a8f6a721821ec7033df3c07e64e01fc4cbe1404698f78116ecaf632b195bf83a7ea683dd2f0bed91"}, 0x51, 0x2) sendfile(r5, r6, 0x0, 0xff7ffffe) ioctl$TCXONC(r6, 0x540a, 0x3) setresuid(r1, r3, r4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 458.390172] FAULT_INJECTION: forcing a failure. [ 458.390172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 458.402010] CPU: 1 PID: 9745 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 458.409794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.419141] Call Trace: [ 458.421733] dump_stack+0x1b2/0x283 [ 458.425370] should_fail.cold+0x10a/0x154 [ 458.429535] ? kernel_text_address+0x6e/0xe0 [ 458.433953] __alloc_pages_nodemask+0x22b/0x2730 [ 458.438719] ? trace_hardirqs_on+0x10/0x10 [ 458.442990] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 458.447851] ? trace_hardirqs_on+0x10/0x10 [ 458.452082] ? do_syscall_64+0x1d5/0x640 [ 458.456145] ? trace_hardirqs_on+0x10/0x10 [ 458.460379] ? lock_acquire+0x170/0x3f0 [ 458.464363] cache_grow_begin+0x91/0x410 [ 458.468412] cache_alloc_refill+0x28c/0x360 [ 458.472748] kmem_cache_alloc+0x333/0x3c0 [ 458.476874] getname_kernel+0x4e/0x340 [ 458.480739] kern_path+0x1b/0x40 [ 458.484086] lookup_bdev.part.0+0x60/0x160 [ 458.488296] ? blkdev_open+0x250/0x250 [ 458.492160] ? selinux_key_alloc+0x1a0/0x1a0 [ 458.496545] blkdev_get_by_path+0x70/0xf0 [ 458.500679] btrfs_scan_one_device+0x84/0x330 [ 458.505146] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 458.510223] ? device_list_add+0x8f0/0x8f0 [ 458.514432] btrfs_mount+0x528/0x2838 [ 458.518207] ? _find_next_bit+0xdb/0x100 [ 458.522240] ? pcpu_alloc+0x37d/0xf70 [ 458.526013] ? btrfs_remount+0x10c0/0x10c0 [ 458.530228] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 458.535651] ? rcu_read_lock_sched_held+0x10a/0x130 [ 458.540728] ? pcpu_alloc+0xe1/0xf70 [ 458.544423] ? __lockdep_init_map+0x100/0x560 [ 458.548896] ? __lockdep_init_map+0x100/0x560 [ 458.553367] mount_fs+0x92/0x2a0 [ 458.556715] vfs_kern_mount.part.0+0x5b/0x3c0 [ 458.561186] vfs_kern_mount+0x3c/0x60 [ 458.564961] btrfs_mount+0x2a0/0x2838 [ 458.568739] ? _find_next_bit+0xdb/0x100 [ 458.572776] ? pcpu_alloc+0x37d/0xf70 [ 458.576553] ? btrfs_remount+0x10c0/0x10c0 [ 458.580766] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 458.586190] ? rcu_read_lock_sched_held+0x10a/0x130 [ 458.591183] ? pcpu_alloc+0xe1/0xf70 [ 458.594877] ? pcpu_find_block_fit+0x380/0x380 [ 458.599432] ? __lockdep_init_map+0x100/0x560 [ 458.603900] ? __lockdep_init_map+0x100/0x560 [ 458.608374] mount_fs+0x92/0x2a0 [ 458.611721] vfs_kern_mount.part.0+0x5b/0x3c0 [ 458.616195] do_mount+0x3c9/0x25e0 [ 458.619726] ? copy_mount_string+0x40/0x40 [ 458.623951] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 458.628782] ? copy_mnt_ns+0x8a0/0x8a0 [ 458.632643] ? copy_mount_options+0x1ec/0x2e0 [ 458.637114] ? copy_mnt_ns+0x8a0/0x8a0 [ 458.640976] SyS_mount+0xa8/0x120 [ 458.644415] ? copy_mnt_ns+0x8a0/0x8a0 [ 458.648279] do_syscall_64+0x1d5/0x640 [ 458.652160] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 458.657328] RIP: 0033:0x45f57a [ 458.660496] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 458.668216] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 458.675465] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 458.682707] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 458.689951] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 458.697205] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x3, 0x8, 0x10001, 0xffff, 0x9, "4ce85af71f702822e57ce5fcc57b7629becb75"}) 06:02:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000200)=ANY=[@ANYBLOB="000a010700000000ffffffffffffffffff00000000000001fe880000000000000000000000000101fc010000000000000000000000000001fc010000000000000000000000000000fe8000000000000000000000000000aa"], 0x58) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r1 = socket(0x11, 0x800000003, 0x8) finit_module(r1, &(0x7f0000000180)='bbr\x00', 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockname$ax25(r1, &(0x7f0000000380)={{0x3, @netrom}, [@bcast, @null, @null, @rose, @bcast, @bcast, @bcast, @rose]}, &(0x7f0000000480)=0x48) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000004c0)={r5, 0x100, 0x23}, &(0x7f0000000500)=0x8) [ 458.779777] BTRFS error (device loop5): superblock checksum mismatch [ 458.832539] BTRFS error (device loop5): open_ctree failed [ 458.838955] print_req_error: I/O error, dev loop4, sector 128 06:02:55 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r1 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r4, r5, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ftruncate(r0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="8da49d3ac0ed02000a3da70f2d01004dd4b06bfe9706ea51cc417a00000000001e1b00b10efd9a000001000000000001fffffff60000005f42485266535f1f134b5e891af84dc88564d11fef9f653c96983382f17c295dae35b3122eb5127d591570d6d61dd774eb12668d787af9c2ab5ff0f0ff526cd87e6727ebd5c4f96abdd899603ca0b3dcf23f3c9bc505a688ba6cea1c1ccc937b884d72639c4201d5e8241c85d588fc38c8af63a4014a7642abc7f240ff29cb357d787cc72ddf5ccea3bca00cf8044eee4bb84123d9dec523e85baa9311805f8641ff449f469bf6c9045f1fc71b4dcea5f6f0720f69de0fcd7b42", 0xf1, 0x10000}], 0x5, 0x0) 06:02:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') preadv(r2, &(0x7f0000000500), 0x241, 0x0) 06:02:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:55 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 459.013800] FAULT_INJECTION: forcing a failure. [ 459.013800] name failslab, interval 1, probability 0, space 0, times 0 [ 459.034981] CPU: 1 PID: 9788 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 459.042784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.052218] Call Trace: [ 459.054807] dump_stack+0x1b2/0x283 [ 459.058442] should_fail.cold+0x10a/0x154 [ 459.062593] should_failslab+0xd6/0x130 [ 459.066569] kmem_cache_alloc+0x28e/0x3c0 [ 459.070732] getname_kernel+0x4e/0x340 [ 459.074608] kern_path+0x1b/0x40 [ 459.077958] lookup_bdev.part.0+0x60/0x160 [ 459.082177] ? blkdev_open+0x250/0x250 [ 459.086043] ? selinux_key_alloc+0x1a0/0x1a0 [ 459.090423] blkdev_get_by_path+0x70/0xf0 [ 459.094545] btrfs_scan_one_device+0x84/0x330 [ 459.099013] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 459.104006] ? device_list_add+0x8f0/0x8f0 [ 459.108217] btrfs_mount+0x528/0x2838 [ 459.111999] ? _find_next_bit+0xdb/0x100 [ 459.116037] ? pcpu_alloc+0x37d/0xf70 [ 459.119815] ? btrfs_remount+0x10c0/0x10c0 [ 459.124029] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 459.129455] ? rcu_read_lock_sched_held+0x10a/0x130 [ 459.134474] ? pcpu_alloc+0xe1/0xf70 [ 459.138168] ? __lockdep_init_map+0x100/0x560 [ 459.142639] ? __lockdep_init_map+0x100/0x560 [ 459.147114] mount_fs+0x92/0x2a0 [ 459.150469] vfs_kern_mount.part.0+0x5b/0x3c0 [ 459.154948] vfs_kern_mount+0x3c/0x60 [ 459.158732] btrfs_mount+0x2a0/0x2838 [ 459.162516] ? _find_next_bit+0xdb/0x100 [ 459.166597] ? pcpu_alloc+0x37d/0xf70 [ 459.170370] ? btrfs_remount+0x10c0/0x10c0 [ 459.174580] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 459.180002] ? rcu_read_lock_sched_held+0x10a/0x130 [ 459.184987] ? pcpu_alloc+0xe1/0xf70 [ 459.188674] ? pcpu_find_block_fit+0x380/0x380 [ 459.193228] ? __lockdep_init_map+0x100/0x560 [ 459.197694] ? __lockdep_init_map+0x100/0x560 [ 459.202311] mount_fs+0x92/0x2a0 [ 459.205670] vfs_kern_mount.part.0+0x5b/0x3c0 [ 459.210151] do_mount+0x3c9/0x25e0 [ 459.213663] ? copy_mount_string+0x40/0x40 [ 459.217872] ? copy_mount_options+0x17d/0x2e0 [ 459.222344] ? copy_mount_options+0x18f/0x2e0 [ 459.226811] ? copy_mount_options+0x1ec/0x2e0 [ 459.231276] ? copy_mnt_ns+0x8a0/0x8a0 [ 459.235135] SyS_mount+0xa8/0x120 [ 459.238556] ? copy_mnt_ns+0x8a0/0x8a0 [ 459.242412] do_syscall_64+0x1d5/0x640 [ 459.246288] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 459.251448] RIP: 0033:0x45f57a [ 459.254606] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 459.262284] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 459.269527] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 459.276767] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 459.284011] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 459.291253] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:56 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:56 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400080, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x7ff) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x404482, 0x0) ioctl$VIDIOC_OVERLAY(r4, 0x4004560e, &(0x7f0000000100)=0x6) [ 459.389143] print_req_error: I/O error, dev loop4, sector 128 [ 459.395322] FAULT_INJECTION: forcing a failure. [ 459.395322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 459.429622] CPU: 0 PID: 9808 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 459.437430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.446770] Call Trace: [ 459.449340] dump_stack+0x1b2/0x283 [ 459.452941] should_fail.cold+0x10a/0x154 [ 459.457062] __alloc_pages_nodemask+0x22b/0x2730 [ 459.461790] ? lock_acquire+0x170/0x3f0 [ 459.465753] ? trace_hardirqs_on+0x10/0x10 [ 459.469982] ? trace_hardirqs_on+0x10/0x10 [ 459.474189] ? blkdev_get+0x46f/0x8a0 [ 459.477962] ? __mutex_lock+0x2cb/0x1430 [ 459.482014] ? __mutex_unlock_slowpath+0x75/0x780 [ 459.486834] ? blkdev_get+0x537/0x8a0 [ 459.490613] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 459.495424] ? lock_downgrade+0x6e0/0x6e0 [ 459.499544] ? __radix_tree_lookup+0x19f/0x2d0 [ 459.504100] ? find_get_entry+0x31b/0x660 [ 459.508221] ? lock_downgrade+0x6e0/0x6e0 [ 459.512346] alloc_pages_current+0xe7/0x1e0 [ 459.516639] __page_cache_alloc+0x243/0x3c0 [ 459.520938] do_read_cache_page+0x316/0xc10 [ 459.525232] ? blkdev_writepages+0xd0/0xd0 [ 459.529443] btrfs_read_disk_super+0xd0/0x370 [ 459.533924] btrfs_scan_one_device+0xb5/0x330 [ 459.538390] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 459.543379] ? device_list_add+0x8f0/0x8f0 [ 459.547600] btrfs_mount+0x528/0x2838 [ 459.551397] ? _find_next_bit+0xdb/0x100 [ 459.555431] ? pcpu_alloc+0x37d/0xf70 [ 459.559205] ? btrfs_remount+0x10c0/0x10c0 [ 459.563419] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 459.568845] ? rcu_read_lock_sched_held+0x10a/0x130 [ 459.573835] ? pcpu_alloc+0xe1/0xf70 [ 459.577528] ? __lockdep_init_map+0x100/0x560 [ 459.582011] ? __lockdep_init_map+0x100/0x560 [ 459.586488] mount_fs+0x92/0x2a0 [ 459.589842] vfs_kern_mount.part.0+0x5b/0x3c0 [ 459.594316] vfs_kern_mount+0x3c/0x60 [ 459.598095] btrfs_mount+0x2a0/0x2838 [ 459.601881] ? _find_next_bit+0xdb/0x100 [ 459.605920] ? pcpu_alloc+0x37d/0xf70 [ 459.609696] ? btrfs_remount+0x10c0/0x10c0 [ 459.613909] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 459.619346] ? rcu_read_lock_sched_held+0x10a/0x130 [ 459.624341] ? pcpu_alloc+0xe1/0xf70 [ 459.628036] ? pcpu_find_block_fit+0x380/0x380 [ 459.632590] ? __lockdep_init_map+0x100/0x560 [ 459.637057] ? __lockdep_init_map+0x100/0x560 [ 459.641524] mount_fs+0x92/0x2a0 [ 459.644866] vfs_kern_mount.part.0+0x5b/0x3c0 [ 459.649341] do_mount+0x3c9/0x25e0 [ 459.652853] ? copy_mount_string+0x40/0x40 [ 459.657059] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 459.661872] ? copy_mnt_ns+0x8a0/0x8a0 [ 459.665732] ? copy_mount_options+0x1ec/0x2e0 [ 459.670194] ? copy_mnt_ns+0x8a0/0x8a0 [ 459.674051] SyS_mount+0xa8/0x120 [ 459.677481] ? copy_mnt_ns+0x8a0/0x8a0 [ 459.681342] do_syscall_64+0x1d5/0x640 [ 459.685204] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 459.690362] RIP: 0033:0x45f57a [ 459.693521] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 459.701200] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 459.708444] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 459.715683] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 459.722923] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 06:02:56 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r1 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r4, r5, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ftruncate(r0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="8da49d3ac0ed02000a3da70f2d01004dd4b06bfe9706ea51cc417a00000000001e1b00b10efd9a000001000000000001fffffff60000005f42485266535f1f134b5e891af84dc88564d11fef9f653c96983382f17c295dae35b3122eb5127d591570d6d61dd774eb12668d787af9c2ab5ff0f0ff526cd87e6727ebd5c4f96abdd899603ca0b3dcf23f3c9bc505a688ba6cea1c1ccc937b884d72639c4201d5e8241c85d588fc38c8af63a4014a7642abc7f240ff29cb357d787cc72ddf5ccea3bca00cf8044eee4bb84123d9dec523e85baa9311805f8641ff449f469bf6c9045f1fc71b4dcea5f6f0720f69de0fcd7b42", 0xf1, 0x10000}], 0x5, 0x0) 06:02:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') preadv(r2, &(0x7f0000000500), 0x241, 0x0) [ 459.730162] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x500) r2 = socket(0x11, 0x800000003, 0x8) r3 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(0xffffffffffffffff, r3, 0x0, 0xff7ffffe) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) recvfrom(r4, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000001800)={0xf0, 0x0, &(0x7f0000001600)=[@exit_looper, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000200)={@flat=@handle={0x73682a85, 0xa, 0x2}, @fd={0x66642a85, 0x0, r0}, @fd={0x66642a85, 0x0, r4}}, &(0x7f0000000140)={0x0, 0x18, 0x30}}, 0x400}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x68, 0x18, &(0x7f0000001380)={@flat=@weak_handle={0x77682a85, 0x1, 0x3}, @ptr={0x70742a85, 0x0, &(0x7f0000000340)=""/18, 0x12, 0x1, 0x11}, @ptr={0x70742a85, 0x0, &(0x7f0000000380)=""/4096, 0x1000, 0x1, 0x3d}}, &(0x7f0000001400)={0x0, 0x18, 0x40}}}, @acquire_done={0x40106309, 0x3}, @transaction={0x40406300, {0xfffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000001540)={@flat=@weak_handle={0x77682a85, 0x110a}, @fd={0x66642a85, 0x0, r0}, @ptr={0x70742a85, 0x1, &(0x7f0000001440)=""/237, 0xed, 0x0, 0x39}}, &(0x7f00000015c0)={0x0, 0x18, 0x30}}}, @register_looper], 0xd2, 0x0, &(0x7f0000001700)="3b4188129eb1812a3a98d19954c99247489a117dbf7808b80621e937466b0d175497f7d31f164edb3828dfeaddedfd1d6e15357060555974ef16042f537eaacd8adc60a232820ae782b5182fa19f8a654a82389c80508b25044cec219b3dcf6c59ae706a176723e8158a8a41e29b391337a08b22e768074395f34984d5c70fa3474af208ee7199b46496cbc186091ab95643db5994a6e8a3f64fe86ede7a9712935979c6f980776e6835cdccdda73ee4656c96d76bac5f8b9d23ca632589476c7c60819dd908c5f730d912850efebe4e6ea5"}) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000100)) 06:02:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000180)='bbr\x00', 0x1) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0x1f, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000100)=0xfffffffffffffff7) 06:02:56 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r1 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r4, r5, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ftruncate(r0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="8da49d3ac0ed02000a3da70f2d01004dd4b06bfe9706ea51cc417a00000000001e1b00b10efd9a000001000000000001fffffff60000005f42485266535f1f134b5e891af84dc88564d11fef9f653c96983382f17c295dae35b3122eb5127d591570d6d61dd774eb12668d787af9c2ab5ff0f0ff526cd87e6727ebd5c4f96abdd899603ca0b3dcf23f3c9bc505a688ba6cea1c1ccc937b884d72639c4201d5e8241c85d588fc38c8af63a4014a7642abc7f240ff29cb357d787cc72ddf5ccea3bca00cf8044eee4bb84123d9dec523e85baa9311805f8641ff449f469bf6c9045f1fc71b4dcea5f6f0720f69de0fcd7b42", 0xf1, 0x10000}], 0x5, 0x0) 06:02:56 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r4 = accept(r2, &(0x7f0000000480)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000240)=0x80) sendto$inet6(r4, 0x0, 0x0, 0x4000814, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c) r5 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0xc8, r6, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xad}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe13e}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xff}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xd}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0xc8}}, 0x800) sendfile(r1, r5, 0x0, 0xff7ffffe) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x1, 0x3}, {0x8000, 0x94}, {0xe105, 0x78}, {0x5, 0x5}, {0x2, 0x7f}, {0x200, 0x800}, {0x346e, 0x8}]}) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) 06:02:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x241, 0x0) 06:02:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x182a3, 0x4, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200), 0xfffffffffffffff9}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469def7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f00000007c0)="cc69e6fb766eb8716f487e448c28c393f019d5cb76ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840), 0x30}, 0x20008000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) recvfrom(r3, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r5 = openat$userio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/userio\x00', 0x608800, 0x0) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="b5b1255ef88f53d9a40d5baf818c67f414444e014149fdd93c13fa", 0x1b}, {&(0x7f0000000380)="20a0f2d8a726bc959285668b747dfd80f563b2a4df749b9cd5b20c6d61ffa5cebc87c50ab7f122a9340fc9bdda02919004afc57a9feb9b55b2ea8957865b45a92e3e9b687e7d6a234f5a4a", 0x4b}, {&(0x7f0000000480)="89f09c5a313136d3216e9ffeb60b33f6e051a5646166d893946d472302ab0121bff568c416a1206443cf5e2b992a60cb7236d6203f6ce30692184d1946837cb6b1042d7ff976a6846ff9bacd6c38f1f1717efb6d3a8fc42bad42a065c17e500ead4dfcae5cc651ed5122cc1691f28ccf3d756a3d47", 0x75}, {&(0x7f0000000640)="717dab1eb552c0388b8d62a7be65873f97f487284d3b84d09bb8b9e6008a479164dcb637eb1f9b32275accccbb2f9d0fb8525ced65deed99789fc8f92af20f2997a891a91d7746a3d059727a11a2903a0583c3667a57a3d72db950bc980a4267a0c083a0ab64520cc2202be93a9c83ef547f8e5c8b8091703ae3d3d2f39c0735997ba7cbe69bbac380c8b986c2a67e4246935453224b1ed1512c1a31273300ebf333acaf4c4102240e36347b", 0xac}], 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r0, @ANYBLOB="20454bbb9e518430273bc777981dc6000000"], 0x50, 0xd9555a7b6e759548}, 0x4004000) 06:02:56 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r1 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r4, r5, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ftruncate(r0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000200)) [ 460.081264] FAULT_INJECTION: forcing a failure. [ 460.081264] name failslab, interval 1, probability 0, space 0, times 0 [ 460.092735] CPU: 1 PID: 9875 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 460.100519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.109860] Call Trace: [ 460.112442] dump_stack+0x1b2/0x283 [ 460.116041] should_fail.cold+0x10a/0x154 [ 460.120159] should_failslab+0xd6/0x130 [ 460.124102] kmem_cache_alloc+0x40/0x3c0 [ 460.128130] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 460.133721] __radix_tree_create+0x32b/0x4b0 [ 460.138117] ? check_preemption_disabled+0x35/0x240 [ 460.143108] page_cache_tree_insert+0x98/0x2a0 [ 460.147662] ? file_check_and_advance_wb_err+0x370/0x370 [ 460.153079] ? __add_to_page_cache_locked+0x22a/0x890 [ 460.158241] __add_to_page_cache_locked+0x23a/0x890 [ 460.163240] ? page_cache_tree_insert+0x2a0/0x2a0 [ 460.168056] add_to_page_cache_lru+0xea/0x300 [ 460.172520] ? add_to_page_cache_locked+0x40/0x40 [ 460.177331] ? __page_cache_alloc+0xd7/0x3c0 [ 460.181712] do_read_cache_page+0x338/0xc10 [ 460.186013] ? blkdev_writepages+0xd0/0xd0 [ 460.190222] btrfs_read_disk_super+0xd0/0x370 [ 460.194688] btrfs_scan_one_device+0xb5/0x330 [ 460.199152] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 460.204138] ? device_list_add+0x8f0/0x8f0 [ 460.208342] btrfs_mount+0x528/0x2838 [ 460.212132] ? pcpu_find_block_fit+0x2ed/0x380 [ 460.216683] ? pcpu_alloc+0x37d/0xf70 [ 460.220453] ? btrfs_remount+0x10c0/0x10c0 [ 460.224659] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 460.230077] ? rcu_read_lock_sched_held+0x10a/0x130 [ 460.235060] ? pcpu_alloc+0xe1/0xf70 [ 460.238746] ? __lockdep_init_map+0x100/0x560 [ 460.243207] ? __lockdep_init_map+0x100/0x560 [ 460.247670] mount_fs+0x92/0x2a0 [ 460.251004] vfs_kern_mount.part.0+0x5b/0x3c0 [ 460.255465] vfs_kern_mount+0x3c/0x60 [ 460.259233] btrfs_mount+0x2a0/0x2838 [ 460.263018] ? pcpu_find_block_fit+0x2ed/0x380 [ 460.267580] ? pcpu_alloc+0x37d/0xf70 [ 460.271436] ? btrfs_remount+0x10c0/0x10c0 [ 460.275641] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 460.281060] ? rcu_read_lock_sched_held+0x10a/0x130 [ 460.286041] ? pcpu_alloc+0xe1/0xf70 [ 460.289726] ? pcpu_find_block_fit+0x380/0x380 [ 460.294276] ? __lockdep_init_map+0x100/0x560 [ 460.298740] ? __lockdep_init_map+0x100/0x560 [ 460.303204] mount_fs+0x92/0x2a0 [ 460.306540] vfs_kern_mount.part.0+0x5b/0x3c0 [ 460.311007] do_mount+0x3c9/0x25e0 [ 460.314518] ? copy_mount_string+0x40/0x40 [ 460.318723] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 460.323531] ? copy_mnt_ns+0x8a0/0x8a0 [ 460.327519] ? copy_mount_options+0x1ec/0x2e0 [ 460.331993] ? copy_mnt_ns+0x8a0/0x8a0 [ 460.335860] SyS_mount+0xa8/0x120 [ 460.339295] ? copy_mnt_ns+0x8a0/0x8a0 [ 460.343154] do_syscall_64+0x1d5/0x640 [ 460.347015] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 460.352272] RIP: 0033:0x45f57a [ 460.355432] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 460.363109] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 460.370350] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 460.377707] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 460.384947] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 460.392187] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 460.424875] BTRFS error (device loop5): superblock checksum mismatch 06:02:57 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 460.477403] BTRFS error (device loop5): open_ctree failed [ 460.551829] FAULT_INJECTION: forcing a failure. [ 460.551829] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 460.564014] CPU: 0 PID: 9912 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 460.571804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.581159] Call Trace: [ 460.583727] dump_stack+0x1b2/0x283 [ 460.587333] should_fail.cold+0x10a/0x154 [ 460.591462] __alloc_pages_nodemask+0x22b/0x2730 [ 460.596192] ? lock_acquire+0x170/0x3f0 [ 460.600138] ? trace_hardirqs_on+0x10/0x10 [ 460.604351] ? trace_hardirqs_on+0x10/0x10 [ 460.608561] ? blkdev_get+0x46f/0x8a0 [ 460.612336] ? __mutex_lock+0x2cb/0x1430 [ 460.616368] ? __mutex_unlock_slowpath+0x75/0x780 [ 460.621196] ? blkdev_get+0x537/0x8a0 [ 460.624984] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 460.629805] ? lock_downgrade+0x6e0/0x6e0 [ 460.633950] ? __radix_tree_lookup+0x19f/0x2d0 [ 460.638507] ? find_get_entry+0x31b/0x660 [ 460.642640] ? lock_downgrade+0x6e0/0x6e0 [ 460.646770] alloc_pages_current+0xe7/0x1e0 [ 460.651076] __page_cache_alloc+0x243/0x3c0 [ 460.655378] do_read_cache_page+0x316/0xc10 [ 460.659670] ? blkdev_writepages+0xd0/0xd0 [ 460.663887] btrfs_read_disk_super+0xd0/0x370 [ 460.668372] btrfs_scan_one_device+0xb5/0x330 [ 460.672843] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 460.677844] ? device_list_add+0x8f0/0x8f0 [ 460.682062] btrfs_mount+0x528/0x2838 [ 460.685844] ? pcpu_find_block_fit+0x2ed/0x380 [ 460.690404] ? pcpu_alloc+0x37d/0xf70 [ 460.694182] ? btrfs_remount+0x10c0/0x10c0 [ 460.698393] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 460.703816] ? rcu_read_lock_sched_held+0x10a/0x130 [ 460.708813] ? pcpu_alloc+0xe1/0xf70 [ 460.712510] ? __lockdep_init_map+0x100/0x560 [ 460.716990] ? __lockdep_init_map+0x100/0x560 [ 460.721460] mount_fs+0x92/0x2a0 [ 460.724803] vfs_kern_mount.part.0+0x5b/0x3c0 [ 460.729271] vfs_kern_mount+0x3c/0x60 [ 460.733045] btrfs_mount+0x2a0/0x2838 [ 460.736818] ? pcpu_find_block_fit+0x2ed/0x380 [ 460.741374] ? pcpu_alloc+0x37d/0xf70 [ 460.745147] ? btrfs_remount+0x10c0/0x10c0 [ 460.749359] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 460.754783] ? rcu_read_lock_sched_held+0x10a/0x130 [ 460.759777] ? pcpu_alloc+0xe1/0xf70 [ 460.763477] ? pcpu_find_block_fit+0x380/0x380 [ 460.768033] ? __lockdep_init_map+0x100/0x560 [ 460.772501] ? __lockdep_init_map+0x100/0x560 [ 460.776969] mount_fs+0x92/0x2a0 [ 460.780312] vfs_kern_mount.part.0+0x5b/0x3c0 [ 460.784780] do_mount+0x3c9/0x25e0 [ 460.788295] ? copy_mount_string+0x40/0x40 [ 460.792500] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 460.797316] ? copy_mnt_ns+0x8a0/0x8a0 [ 460.801174] ? copy_mount_options+0x1ec/0x2e0 [ 460.805637] ? copy_mnt_ns+0x8a0/0x8a0 [ 460.809504] SyS_mount+0xa8/0x120 [ 460.812929] ? copy_mnt_ns+0x8a0/0x8a0 [ 460.816790] do_syscall_64+0x1d5/0x640 [ 460.820654] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 460.825826] RIP: 0033:0x45f57a [ 460.828987] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 460.836673] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 460.843922] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 06:02:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x241, 0x0) 06:02:57 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 460.851161] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 460.858414] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 460.865669] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:57 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r1 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r4, r5, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ftruncate(r0, 0x0) 06:02:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) recvfrom(r2, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) 06:02:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000200)={0x2}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:57 executing program 3: stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x1080, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000340)=ANY=[@ANYBLOB="ab000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0dd00000000000000000000000000000000000000000000000000f900000000000000000000f9ffffff0000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000011827cf9000000"]) [ 460.976878] FAULT_INJECTION: forcing a failure. [ 460.976878] name failslab, interval 1, probability 0, space 0, times 0 [ 461.007834] CPU: 1 PID: 9939 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 461.015651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:02:57 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000180)=[{&(0x7f0000000240)="8da40000000004000000a82a56785952a56175340fe807cb884673ecfe594c01004dd4b002000000100000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a00000100ae3a873d9c88fd0000000001ffff", 0x54, 0x10000}, {&(0x7f00000000c0)="2f383a72ac49b8b148da03b09e26a91b7afc19ae86c89ac3cd1888a0a8a30cb276d2d8e435afd9cf7ca68c34b0e55cff7e1986332a09982aac8c8307451d291dfe76da3e8e2efc420efc531f0aaa269fd3bf4cc57c5915127b85b2773b031dfe9772af5b85a6205e03849991de7bdd19b646243bb7cdde188d07e52a6dff7075bfad3ea32c083dde483f381330b5a3ee76c1395fa093d159fca10006d80e5e54de73aa2770941b0bda4713fbac41", 0xae, 0x8}], 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) bind$ax25(r0, &(0x7f00000001c0)={{0x3, @default, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 461.025002] Call Trace: [ 461.027595] dump_stack+0x1b2/0x283 [ 461.031224] should_fail.cold+0x10a/0x154 [ 461.035372] should_failslab+0xd6/0x130 [ 461.039346] kmem_cache_alloc_node+0x54/0x400 [ 461.043860] create_task_io_context+0x2a/0x3c0 [ 461.048442] generic_make_request_checks+0x1605/0x1a20 [ 461.053715] ? part_round_stats+0x5c0/0x5c0 [ 461.058030] ? trace_hardirqs_on+0x10/0x10 [ 461.062263] generic_make_request+0x6b/0x850 [ 461.066672] ? blk_queue_exit+0x1d0/0x1d0 [ 461.070810] ? check_preemption_disabled+0x35/0x240 [ 461.075818] ? guard_bio_eod+0x15c/0x520 [ 461.079879] submit_bio+0x234/0x390 [ 461.083528] ? generic_make_request+0x850/0x850 [ 461.088198] ? guard_bio_eod+0x1ba/0x520 [ 461.092252] ? bio_add_page+0x96/0xe0 [ 461.096052] submit_bh_wbc+0x526/0x6f0 [ 461.099942] block_read_full_page+0x71f/0x8f0 [ 461.104435] ? set_init_blocksize+0x210/0x210 [ 461.109017] ? __lru_cache_add+0x17b/0x250 [ 461.113249] ? __bread_gfp+0x1f0/0x1f0 [ 461.117136] ? add_to_page_cache_lru+0x151/0x300 [ 461.121890] ? add_to_page_cache_locked+0x40/0x40 [ 461.126729] ? __page_cache_alloc+0xd7/0x3c0 [ 461.131139] do_read_cache_page+0x354/0xc10 [ 461.135457] ? blkdev_writepages+0xd0/0xd0 [ 461.139695] btrfs_read_disk_super+0xd0/0x370 [ 461.144189] btrfs_scan_one_device+0xb5/0x330 [ 461.148686] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 461.153696] ? device_list_add+0x8f0/0x8f0 [ 461.157938] btrfs_mount+0x528/0x2838 [ 461.161740] ? _find_next_bit+0xdb/0x100 [ 461.165811] ? pcpu_alloc+0x37d/0xf70 [ 461.169612] ? btrfs_remount+0x10c0/0x10c0 [ 461.173851] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 461.179304] ? rcu_read_lock_sched_held+0x10a/0x130 [ 461.184318] ? pcpu_alloc+0xe1/0xf70 [ 461.188039] ? __lockdep_init_map+0x100/0x560 [ 461.192528] ? __lockdep_init_map+0x100/0x560 [ 461.197152] mount_fs+0x92/0x2a0 [ 461.200644] vfs_kern_mount.part.0+0x5b/0x3c0 [ 461.205118] vfs_kern_mount+0x3c/0x60 [ 461.208898] btrfs_mount+0x2a0/0x2838 [ 461.212681] ? _find_next_bit+0xdb/0x100 [ 461.216719] ? pcpu_alloc+0x37d/0xf70 [ 461.220500] ? btrfs_remount+0x10c0/0x10c0 [ 461.224715] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 461.230144] ? rcu_read_lock_sched_held+0x10a/0x130 [ 461.235135] ? pcpu_alloc+0xe1/0xf70 [ 461.238830] ? pcpu_find_block_fit+0x380/0x380 [ 461.243386] ? __lockdep_init_map+0x100/0x560 [ 461.247875] ? __lockdep_init_map+0x100/0x560 [ 461.252359] mount_fs+0x92/0x2a0 [ 461.255705] vfs_kern_mount.part.0+0x5b/0x3c0 [ 461.260179] do_mount+0x3c9/0x25e0 [ 461.263701] ? copy_mount_string+0x40/0x40 [ 461.267913] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 461.272731] ? copy_mnt_ns+0x8a0/0x8a0 [ 461.277029] ? copy_mount_options+0x1ec/0x2e0 [ 461.281506] ? copy_mnt_ns+0x8a0/0x8a0 [ 461.285370] SyS_mount+0xa8/0x120 [ 461.288800] ? copy_mnt_ns+0x8a0/0x8a0 [ 461.292668] do_syscall_64+0x1d5/0x640 [ 461.296536] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 461.301702] RIP: 0033:0x45f57a [ 461.304868] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 461.312554] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 461.319800] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 06:02:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r0 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0xd) ftruncate(r0, 0x80006) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f00000000c0)="311872be18b4b6c12fb91a378f76f171c7489e943b05", 0x16, 0x4000011, &(0x7f0000000180)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) recvfrom(r3, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f00000003c0)) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000280)={0xfffffff, 0x0, 0x200, r1, 0x0, &(0x7f0000000240)={0x9a0916, 0x800, [], @ptr=0x81}}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000380)=r5, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x106c086, 0x0) [ 461.327046] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 461.334291] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 461.341536] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000025c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10, &(0x7f0000000200)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000480)="f8a4305eedd519716a9c1466dd17cfae45975ffeea9aa8c12b1c2f2bceb7e3862236b6db98a8c371204077dbacc1dbb00bfe3378a013656cca4b1a1509c466c6555685dc43a915a2cc23937c5fa86efb10fba4641e79e06c8e087e29c50883476d599d8bb320fd236486b13cb58a1ca61a2c57780514d5ceefee1050e554443f89589ad1eba89785b520c9da0ed829a8a87fbcc59e9536f3e0c92bbf03e284c620026383b00242d603cb7b5178364fe73e19d016a4eef6f9ce3d71646e7a57cf7ed80ce2fc9563bcf96a2f50b6f542d329db9a3f1b246ebc933cd7611e6bc48850918e8c", 0xe4}, {&(0x7f0000000340)="da51", 0x2}, {&(0x7f00000005c0)="b6d54fa2e5332b7eb0dd0a41485b5960306d2461ddb301d412f59b81c9831ac4dc9089b369209915703f", 0x2a}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000000380)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x2, 0x0}}}}], 0x38}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 461.397377] print_req_error: I/O error, dev loop4, sector 128 [ 461.406012] BTRFS error (device loop2): superblock checksum mismatch 06:02:58 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r0 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r1 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r3, r4, 0x0) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) 06:02:58 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getpeername$l2tp(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10) [ 461.470862] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 461.500304] BTRFS error (device loop2): open_ctree failed 06:02:58 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 461.541576] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 461.588853] FAULT_INJECTION: forcing a failure. [ 461.588853] name failslab, interval 1, probability 0, space 0, times 0 [ 461.610173] CPU: 0 PID: 9995 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 461.617980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.627320] Call Trace: [ 461.629887] dump_stack+0x1b2/0x283 [ 461.633488] should_fail.cold+0x10a/0x154 [ 461.637611] ? mempool_free+0x1d0/0x1d0 [ 461.641559] should_failslab+0xd6/0x130 [ 461.645506] kmem_cache_alloc+0x40/0x3c0 [ 461.649738] ? mempool_free+0x1d0/0x1d0 [ 461.653677] mempool_alloc+0x111/0x2d0 [ 461.657536] ? remove_element.isra.0+0x1b0/0x1b0 [ 461.662262] ? check_preemption_disabled+0x35/0x240 [ 461.667252] bio_alloc_bioset+0x352/0x640 [ 461.671372] ? bvec_alloc+0x2d0/0x2d0 [ 461.675139] ? lock_downgrade+0x6e0/0x6e0 [ 461.679261] submit_bh_wbc+0xf5/0x6f0 [ 461.683035] block_read_full_page+0x71f/0x8f0 [ 461.687501] ? set_init_blocksize+0x210/0x210 [ 461.691970] ? __lru_cache_add+0x17b/0x250 [ 461.696171] ? __bread_gfp+0x1f0/0x1f0 [ 461.700028] ? add_to_page_cache_lru+0x151/0x300 [ 461.704755] ? add_to_page_cache_locked+0x40/0x40 [ 461.709573] ? __page_cache_alloc+0xd7/0x3c0 [ 461.713961] do_read_cache_page+0x354/0xc10 [ 461.718253] ? blkdev_writepages+0xd0/0xd0 [ 461.722461] btrfs_read_disk_super+0xd0/0x370 [ 461.726925] btrfs_scan_one_device+0xb5/0x330 [ 461.731392] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 461.736375] ? device_list_add+0x8f0/0x8f0 [ 461.740583] btrfs_mount+0x528/0x2838 [ 461.744353] ? pcpu_find_block_fit+0x2ed/0x380 [ 461.748906] ? pcpu_alloc+0x37d/0xf70 [ 461.752687] ? btrfs_remount+0x10c0/0x10c0 [ 461.756903] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 461.762322] ? rcu_read_lock_sched_held+0x10a/0x130 [ 461.767304] ? pcpu_alloc+0xe1/0xf70 [ 461.770996] ? __lockdep_init_map+0x100/0x560 [ 461.775464] ? __lockdep_init_map+0x100/0x560 [ 461.779933] mount_fs+0x92/0x2a0 [ 461.783274] vfs_kern_mount.part.0+0x5b/0x3c0 [ 461.787740] vfs_kern_mount+0x3c/0x60 [ 461.791513] btrfs_mount+0x2a0/0x2838 [ 461.795288] ? pcpu_find_block_fit+0x2ed/0x380 [ 461.799840] ? pcpu_alloc+0x37d/0xf70 [ 461.803612] ? btrfs_remount+0x10c0/0x10c0 [ 461.807822] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 461.813238] ? rcu_read_lock_sched_held+0x10a/0x130 [ 461.818219] ? pcpu_alloc+0xe1/0xf70 [ 461.821904] ? pcpu_find_block_fit+0x380/0x380 [ 461.826458] ? __lockdep_init_map+0x100/0x560 [ 461.830920] ? __lockdep_init_map+0x100/0x560 [ 461.835383] mount_fs+0x92/0x2a0 [ 461.838722] vfs_kern_mount.part.0+0x5b/0x3c0 [ 461.843197] do_mount+0x3c9/0x25e0 [ 461.846712] ? copy_mount_string+0x40/0x40 [ 461.850916] ? copy_mount_options+0x140/0x2e0 [ 461.855380] ? __sanitizer_cov_trace_pc+0x4a/0x50 [ 461.860188] ? copy_mount_options+0x1ec/0x2e0 [ 461.864650] ? copy_mnt_ns+0x8a0/0x8a0 [ 461.868507] SyS_mount+0xa8/0x120 [ 461.871929] ? copy_mnt_ns+0x8a0/0x8a0 [ 461.875786] do_syscall_64+0x1d5/0x640 [ 461.879646] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 461.884805] RIP: 0033:0x45f57a 06:02:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x241, 0x0) 06:02:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x40, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7fffffff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x11) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f80)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000fc0)={0x28, r4, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r4, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [""]}, 0x1c}}, 0x450) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 461.887974] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 461.895670] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 461.902996] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 461.910234] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 461.917484] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 461.924734] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) getsockname$inet(r0, &(0x7f0000000380)={0x2, 0x0, @private}, &(0x7f00000003c0)=0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) r2 = syz_open_procfs(r1, &(0x7f0000000080)='projid_map\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={r2, &(0x7f00000000c0)="45da8b7dd66248101ab3689f194c8cb8b06e0bbef203eb0290f2622516be782c9def75b1df90b16356bc42da513fd50c685299f6927bc0242f9cc9109164c7e36991154794bf1973998fb6b060431d8196e5c92ee083b5c7bf4af776067e48c8b8cc36da6da178283f989d8c6884e7bf732b574e6a2062a43590005808c5fc3705b85a22cd6f106d1dbf0afc8754c01ea3009ed05193a3e9a14028728b4ec183e4b167c86ce342d4d4b355bc41f8acf3792140568bf8b8755bc4805d4975606d41", &(0x7f0000000200)=""/70, 0x4}, 0x20) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x2004404d, &(0x7f0000000440)={0xa, 0x4e20, 0x0, @empty, 0x1}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$sock_void(r2, 0x1, 0x12, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r3, r4, 0x0, 0xff7ffffe) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000400)={0x2, 0x4e20, @local}, 0x10) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000340)={0xdc, 0x2, 0x8}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:02:58 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r0 = socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r1 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r3, r4, 0x0) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) [ 462.006978] BTRFS error (device loop5): superblock checksum mismatch 06:02:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000080)={'gretap0\x00', {0x2, 0x4e23, @private=0xa010100}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r2, 0x80006) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000340)={{0x0, 0x0, 0x80}}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x11881a, 0x0) 06:02:58 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:58 executing program 0: perf_event_open(&(0x7f0000003b40)={0x4, 0x70, 0x0, 0x8a, 0x0, 0x0, 0x0, 0x1000000000041c1, 0xc2d30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x183a3, 0x4, 0x1000000, 0x0, 0x800, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) r1 = creat(&(0x7f0000000380)='./file0\x00', 0x60) sendmmsg$sock(r1, &(0x7f0000001580)=[{{&(0x7f0000000480)=@sco={0x1f, @fixed={[], 0x11}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000640)="adfecb760aa2005e586c793c0f1c1551cd510f3474dda7be6a1e2040ab74148ab70a05858d27d4c255725b6f35fb2a9ce7b963920dd782ad3c212d7a146bb735da6666f7a8151c0f37226a1ea6ce9c6801e78f975d9c1dcb87b2476cbb149d7262f897d6fc5a3f68fdbb8e3b3c7db6157f8c4334884b5decb1f47b0857e8174b0e60dc066b9c71339afe313f8506f6a2675cd4cd7c", 0x95}, {&(0x7f0000000700)="a5581b1b3e317270be935d9745d50888d8cca02485bede806d9291f4981f3466ac91df50b03e7a022661c2248801f2b27e6650046c6e8d23b08a5acfb433cc0ad1f3726972cdf2fa2bd163627baf669940368c9c64ac974eb66c84ed7d5686c2e1722cc94b744c155acd6f4ff8a6812f344c36a3f2585b0bcb03db95099bc69fa8217e254d8cf3cc526965130c2d5b957aed47c3e89bd46f63ed1e109d1d0dee5622e8fe7af26fdb2e7444549600f66008aa010a604e6385178129c111b4bc96865aac5f047da136629242ac1125eb13d9c181dc766178c081c36ad3d14cfc63cb48032e28aca9cb", 0xe8}, {&(0x7f00000003c0)="05db397015e1508f3c2c98bdc012be816959f379a0dd885c189178", 0x1b}, {&(0x7f0000000500)="040287d440b4909f", 0x8}, {&(0x7f00000018c0)="b323b7d2f907485f05f505806030255bedd4526545153f5b7d7bf3b63870c3af7f883834fa4271bd774b6bc368d789ca41e0b2dcd19b5cd17abea1f3fedad0d646760e213d20b4995e95233fd6a0d4730421f360d5981bf5f0e1039e342966544baf73eccf6fcf9f27ea101308ef0a9b374d334cd8ff71d30366f2820670c069d56a4b046c8754dd2b8c572fe5a432f6e3405cbe108d6afe95d2f259a8847a5e418a003f2860db6c5685ab68dfe554ba5930e31083e2f7346312131503ff97bb7b1ace6e8872c7b789b8e45532fa012d518bec30ca8648f7faa60e51d627b7392952499184110829dc5ee7ac370fcaa3a7e3ce982678b52a7e7502b0c248a702e72de02d52979b5f24f20b3b43e7d8c08e50951acb91dd44b9455e033bee6c61d9a3ead1f2884ac8a6db67a5abb4791b9896d44795d648dc59e97e06c19a170ed137831939a668d870f6a6474b19f60f07b9e6ccb49ab7f96f661efb0b77c45a31e2a260f3668db3142547af3013791693c6b1994e919358a01a9d8e7958f3760ac471e3d633cf2606cf70c37578d93237c86577d6cfeacf8c92259765714096a37b8e122b947ae8541b94d4ccd44ec6d38e9f5b0d97afd413d8b5dfb515884612b43caf145f7801cf2ab2bb368224e4486fe620d8ee85d3e4e44e5e4379bdeac825fa4f1de896e61507956573be26322b982d7706c9659f2ad3bef05638192af20b69e519503ac7de3b0c890b6fa7ac80886443bf9443ad841005e5fdc5c34f21071017dd3564af91b5a9294b3e1c940e836e97470e8d260217f048f53af0a5b45557e605173fa1d0d3895c8e1db2a887fda18b1d3b2e3c19248745b35094a932bf8ce0d4fdf9bdef74e67e2c30d3b12e8448e77632c20a2e08dc801ff4c3f89fccfbabdbbf4f0ba30cdd056503233557bca1437e330449e4a8c36e9e464f20a945e9a2978a694865b0d1fc373ae444b897db63ab478a6bc957bac9fd33299a75467a6fcadc36d7be23ebbdcfbfb1c094450115ae86327c67c2acb82bf7ecfa4f947352a82ccbb15f3b1333027570a12b25e40adc87e72cb807613de9ed1c68bd2bd856d7e236bc25d53b9ed5abf2735bd61becc811849ddaf1500f88a22b22c64ef6edb5874ccd66686538dffff215da0d37da9e262d5f56a0077f51027745e65715f3a850386a84e9c42858c0de988882ee7d5fbb41be17d2844ca436209ad5672af322b99a522e2560cb2c8b1123f9c8d95771b141b3034d78216c9891ac5518553b70c0fa68e696ad8734990f5b8f74139182249ca9f422129f9f7d12f46cdad5dbe9e70c75408bef0e88945657da90129e3d4f84d8ae84acdc73fc9416265bf7ceca38fb9e911107eadc764abd6027dfc9015d35d7f25cb26416c336bc850629d8487dac384bd8862131052a23c2b50b4a2292fc584385d379a5420c141cb938109f576f3b484ddb2e1238b4eff65d86e5ee87b64a94dab5f0b45ef105279885304c411254c88cad8792ad877392ad6fcedb3a5a30b1b4c7a8b29ceabb3ad45d54c3350c4267eb057b3d7835a3de14ce1bbd0ef0633e43d91a6071ead1a4f16807ce9a8320fa235c8fbc4ce2a0233aabea8866661f62340a5d91f0da332a09e0b78dd561d369ad77c360882da030c3b09d49fee7fc80d7dfa3c2253ec4b1e65b19a8c2c56c7c7e7fa1bc522599f10e66f31717232599c8d1a35f1c3d88176670e69b370d734d9503d80c46adc39a6f436e018c4329a76d9227dea06fea895cd3ba885068d9e4d061186839f88d782649a80b4dc791e10f4624688126d368ac58a2d58cda620814810bb38a87c5abf71de4582ac239930216d8623cd3293571cc50c2245f746e7f9884af651e864a28ad34b67ebd7a167445d97e7ea7d608060017fba7ecba6bc5e8c91e223e15e11fdf3adcaa61c44ac929ef695ae1f2ceb66ba6fdf4cb153879e2afc553e446a7c0de311853375e124a32e432e76fa8ef1a276171d433cc88c86dea5d8405b54161e47eddba34b773712cc9c6d7ce14f745b759ed82696ce644ff3763a1bec7479f64bad5ea80dc3f01ca24d7ddedfb011c0288acb16a524af994fe2f703f3651f1bde198ddeb10c0c5b66f719ef303dcf0aab32ffcf529bf54f4c6c0eefcff5e9ced55de24f95cfbf66f01957a2e65684e02338f17c2081dd01dcfb8bed800637b4a95f1596589e6b4f1f40747a0ae20a3c6e71c53c9534b9aedf34facf93350153bcdaef7fc51d121e4af48e621a38c7400f5b263b709529c9676dfa8a16a8c135023a9f7ff2f3f3f3e8d0c2b375ace19307f914ce5a91125f73b271d4ad74f559c592db33f60f0ee69960eb7580cde2df02b722ba700ebc0d2c492b95b01565ee8039ccb05e5814f711f87473f40899eb6a7b3eafd9ba278ec6a41fb7bac29c6607568dde5a7afc05f5fa94e7262b8afa63354580a7aff9b918770ba7d1035ad068bef12d1cd87555726ef0aa4694032a84bb6f9b054bd388916f89f3f23c68c8df4b216f875009ff8b7ecfeb3ade6b9b59517a49176db7a972c54bb142074ce41194ab33d5bd1ef747debf647ef66d361e5cdffcdb31ee98dfd3bb50a3a1d6311c7745f7c70c0ddc1cc93bf97828f23d0c31d16d0e02133394de840749acad61c0c437af4981899c0fef8057c0a16e4b526af84590843c04af11893f0e251ecfd88a9548579ac28fe5a78fa4680491ca55e7e8d28aee0897319fc2c3da3358c62a7a92fa5bd74309950423a9063075675e4aa888671aa69189041c55c206069d9925115ae4764cc6855c522ee4a63946d5e6a33f31e20926f25b38d95192297e1bf868cb71dc53280c36edf636d2a5d0e786022df5995f43fb4aaf5bfe5cb24b08606ebb024c5ea014feec7b337687ee67b761b82dfbaffd65b58aac5fa4c4b748a7f9881d078a69e6f0941b7163c7757edcbb506885566eda3ed2a2c98e024b4f9c3b80f8e78d559ff9c2fb8e72ac81741c369893cc5b5a481ba90bef51f7c79aee81773ccd79134cfc817a6dce8cc09ac2405821269356879bdd005df85607aa77f150e40bd34b55139b841108618d41adb72a7d114991b4e07712e979584e954567adef9cfc538bbff1ed0ca173582140a6138f85a0ba778f9e4a41c7758791fdcaab7c5b0e9f725bb781f2b3a91e86bdf37bfc06d5c078f720ffa3d9f00ed9b11a994e40c8a287ddd0b9a734713c353eb2d8da2dd97f7127dcae1b9cb1360aa44660760a80713c6fce936488482cb64700387539cb255434b6a74dcfdc9f44e595cc3329f195f7faaca0d7eaaf37ec9e38a13816b092d0f298751ecc3430347009c828eddad8cddad91946cca896f6bf3730ccdc602ec529edb527f74b8bcc957bcdf89dcbd6c90806e3da5aed51290537a8e4e476fbd888bdc371bab2ae5546061615401ddb3536f04c06bb2e64647a64dc82c294a32f10644f35f7497df487958e368aed565af0d9ef4beba6548066a275bff2d091221fc73b89ba13442c58ffff951911b0a9f7e76eebb012c7e29a435b2fb86fadb0fb9ab5b7017381a92bf64b16ce86bb6808ab98f4459455e6b283a58746d80a424aa1bafcfffa9ba6c8291eb02d377e83a4c0d2ee80f41f70a33cad7b2cac197558c580a97b25d151d7a1e4aec1f05071a6539b4d7716b275f814c7ae4c40f3e120d3fe430168bb304569ba7d8b4eccd9cee8cf47c49d2bb6369dff618821d6236d26c7760907b0f7557a397d2b8c851db195212bbfe5a3333e5d99c9989b219c43b45688af022609129d54a06f4e6dfc7ca42f373920317b10966eab6baef80a07e9c9da19067e009ffb6dc4102834acf20bf2b1e278bd8a3b20295a81d5257203fcb93133b3314311edef4339061d8da38a350a168aae166ca12126287f994c7708355741b7bd4fe3eb27670303b4b14c8fbbce188ec52f6056635c50504b9bdf1b95025c94399b5e606342739a63ca4437be5c60581bec5cdbb89450d7aefe21ff12aa5408961d3b4ea90879bc2e653ceab8345289ac8f45439dfb84927957a2a607753d85e0639091530876eec8c1b1ea7b32b43d9df9f31e33d8570acfe4a66cf46c08faa7cffc971409e2096e35e2009b5fbe35ce07f78def734840d0b9c458d2e1084f3a88c90a80b3bb2e832c38f48c4137e6eeb441c3c56b60f22f5084f1b2fb6b7954a184d8cf5c76446cc2d321308682affd3d37d0c83a243eed5e8ab723e9fd6e4543060918c72668ae3d88e7d7042e94dc468abac2d3ba24eea63b770befccb4eff41c82b6613403a4d04cc30ef085b62c37b4b06df9fbb622d5259bb5a31796834cc4ee8cfe49b6bb4c75be6780a8a124a04dc410661304cc73818fb1686fb47464dc5c70c1b60181a6e580eac2cd2bfb2050967e6168176d2a0ff2a1c9b7d422d875905a5c82400a71f33baa5d19836c92e73618a9e0813113736cd77b3d5fe4661311de510fc59e64b5894b8550187b5b0c9a1230a60b7eb70b62aa06758f8795a9ec3cb16398c2871d6f9659f7cab522ad90b8cd04af1fb40037379da9f317241dfc3150ba2dcbee4954397798872f9b4f743a477e4c67d9f9aa97499e339742a7715de3b6b95c9ef3abe2d3dfa0a183a09fc2b15247f4f1e1ef707606449dfee3df5b222228115b5a5abe451ffe3ff09a8b2e22103c0dacca069d17f703c6cc2322747e12305324d1284da82bc520ce7cfe491ec37f38cf392effab33e9f4368e2d17497c3092700dc689d7f31dcad1160d72a9315f5e08af1ae82c8a8a7bdf0b87fd71652cd8b9a9bbc0ba587d03832ee8fcaabccddbd99d983df6e1431ecaf35a888c34444b754b31c947c3494c3131dba62f28bec3c063d823af9de625b699b5928bfcd470bba1b3a6fc80221edce947d7b143ece0652d14d4c3dfe82e45b3f0a92fbbcd70d19e7b69fbcb37ed1a4251c4886b7a12625b4db0427230571c32538e2c40ec8249da84fa457f5c4b9ed096e4a634976320e7c69cfb130a296a8e21538defe5743de67e20b85cf508dfc2a94acc244188a64d0d4619be64afb4c959d794667d0ee0de0a9d2fc7f430fe9cfb6ca8bcff8edddbf5024b06711826d795b56f7771acb1b700331e3010307ee15100c17e5ae6ddf709a6569cd301e753cc6eb6acd63faacbae1b6de2b6b2209f7981f92787f20e456f5ed850ebc9c871bbd73661780a5197f518e6a805e36c9f13c0ab9100c7dcf50caa38fc37be289db29d6c30ba55a9414e9af0cb8916864d18170aa369fe70ae437d6ed0a30a846d339459f14e5ee390d761ee574c8b158bccaa89b0fce0f44e75f6974baf9e002c20a2d45df9eec7eb96c3105aed8b63b654943427cfa38dbc849b7fd506f1e57b1d58583ef71e70808e2094b5d82cc6fb36fe683d0f9974652e0bcabb742926dbf409f4f9e03fc1fa8684dea0de0fef39039155e0ce56f89b75443b636f36e87ffaef2352099e7289ced8d1eba7f4b8c69a4717b76c739e9137864962de1f145e4c7332f98fb63138a54eb654ccc3ac6281ee7ee2ba82f9b168c61261a972e55313e794297abcc32693078a9d71aa36c6cacaaaa59a47438097905cc0ac3c7199a66d3cdc2370c5938ee49d46c718d426005bdecb9eb2f4c4297b257b3768121e4a997c277c23a82c6f0dc5dbd436297d59ee5127dd27fc8bcece533176078e700458eeddfc623c2617bdb9e097e0dfdbd24fdb8311ba42a01f4661068094251958d09108a87b454153711b91e3d3db2d42ceac352f5c4b856552007ce41dd0c7a466ba25add137ffdf19d70", 0x1000}, {&(0x7f0000000800)="b78a08c657f0c528b1fbac9071f07fa4242b73fe2327308218d85cac397aefe178f649113bac52a864916b9fbec151282ea2a2826fd3baa6a1cb1ffd34e7bbdd1cd991897847226034e7ecf0d2af4819cf64a1644fbe1ab61044e888e06a2981fd0bfcca493b85888c838ee1dfbb5a871cc8c3a422c524c0e53b3b5d06d011b2dc29a77db97c2f177df39d5716058ae7c9094b6f8b4fb397ea2df975ddc2d67f79b9043b104298a79178b475ea1a5aca7e554804fd9322ecfe1a4a5765924d2a69230bfe9ef95c96738c040b9f1aeb07e92793e8085e8bb0b914b0001ea1d16e13d205383fb071", 0xe7}, {&(0x7f0000000900)="eb241ce9c78310ec1accfea9412ed12f753a95d07f999ad622e27a716a22fbde6666586a0a8aa9c2b74da6f5dd44e21e2cb23e49a6bb096e6fb57b1d600b4a61905afca89846924e7bcc01ad935bb0479bb6fc408dc1dc9e882553696a00f88288cab4767a289d5d79e0287b4442099d35d7fdb3ae3baa09790071342ea36e64889ebed3d9b180abfd32eae3", 0x8c}], 0x7, &(0x7f0000000a40)=[@txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0xae}}, @txtime={{0x18, 0x1, 0x3d, 0x529b}}], 0x48}}, {{&(0x7f0000000ac0)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0x64010101}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000b40)="d3bb0eca10c2f15d4d05bdc6372bfff35da2075bf6781f1761295966c4cff7d8c1d606b5ce61d5d97711a72d68eee57fa1f38dd7f350c607b49423f253bc69c8af01ebf4598968", 0x47}, {&(0x7f0000000540)}, {&(0x7f0000000bc0)="afd22c4ad12809ebbe14a852f648679adf6410c141942c8376b9056fd6780747cebf707fc29a0745d6843c1b488bf7509777804002d2b521827349783ae54b1bbf383f1ff6714cb10567a3843e1e9a3b230a2b80307de9feea", 0x59}, {&(0x7f0000000c40)="3c5d32b2a624d0d0eda3f53eb52da7c87d57d3671d079d28a1b7467cca11c118aeb551a7c9bd38de3d8b873f9019cf6eee8835899344a912d58f9fd9f35bd4b945c5de30272dd41d3815142a8ec2b2b2ecfd0eb6b14d40f8b5ea8f9396ff6e8ab9f5ee36ad827d8359449b4d9fa4d019a88dda8ffacf22b88262ed9631d626e773db36906b4db055f1ed83a96bb9ecde02f87136b45d70cf558b7704ecc5a3ca8b149cac58f87a0a47a97c6d0dff53633c2acbb4a1b4cfbf6dbe27233615793aa020b18aa5de030a1dd708b98882591f5bde612fdab6c7cf0a73541bf6d7a3deecb79fca56cfb730b1956b410da78f3340bef638", 0xf4}, {&(0x7f00000005c0)="e96025427b2640fc7304d8b8715e05859cea5378c864517764fec706f46af4cbc6ad3185146a686cf06e386141d7d382bb89ad01a80c", 0x36}, {&(0x7f0000000d40)="b1f547a02396bee571983ccedb47160ffcaf64d412b997137cd6872262be0f4b336e633ca9075550627b1eb16065bf656028a8182fb2be75265858f41b35bd42646a769a34df6c60a60769155e4c4030208f7e9cc839eb0bb790364a3702600ea9ca72daed41636535", 0x69}, {&(0x7f0000000dc0)="896e5cd01e53075927eef8a44ea439ee930c5518bbb6c554df9fcb351912b93e5e6b4d59210361f6b4951272c7c8b4a0434d77a39407e481827e9fd910d3a5698e61f96ac789464f145a58ba5ce166a4e2fe8b3701", 0x55}], 0x7, &(0x7f0000000ec0)=[@txtime={{0x18, 0x1, 0x3d, 0xa1}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x30}}, {{&(0x7f0000000f00)=@nfc_llcp={0x27, 0x0, 0x2, 0x1, 0x7, 0x81, "060ed4b3da738d61b5775c98a783b57c6688f8b85713858d3ecf841c569d484ffd1006d863b5b457bd4941367ecb542d97ea88de3d39c89066d472415cb24c", 0x1}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f80)="df072d3dbd3490c61fcdda5f2c6dd42306dd4d6cf7b6123f576cbda9eb2e47f92f2dbb2eb8551912e0724bc09a576a29a50cbba6d488fa9a07c25f9c7a4a5e1d173b2049ce2d09b9a668e6ad8fde37d0ed02970e0ea9ed72d65c23257ab45f59e22f85f5e6fb925cc6d64e94d4b45fe5766935eb7eca974fcf32d490c6937c11227b3ffc6238bffaad8529ae46d4e6536a86c8164c9e8c6354ae29c7619813fdf4fdbac61a4b53b959da2143c6398e4717090a33126df61877d979e49d38d05f71db891c2c3e35e98b7aaa7d00b5d16e333b8570", 0xd4}, {&(0x7f0000001080)="dfc86f87c51bf97fdc2bac89dd07453646920f4c16da9a38708232f1d02de608498d63da241b092f39c3b9c0b113af59", 0x30}, {&(0x7f00000028c0)="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", 0x1000}, {&(0x7f00000010c0)="ad03bb8623af9c125720c89d6c74e9073112ccf6c8d9c77ead4e72e5a985f58852113d9eb77f86dd6b9fe1c2041287a2648d370cdae1af7c727126d37cee45768302bb3cb7bf8f28248bf59705428046d4964f983a9fe981dd8b2eb17cc248044acb5c04bd0e2d296e738fd988c0732018ccd37bebfd61ae65415c8516b61cbb1d9c56c16e00af72dba2692ca536ad26d78b3bc484bf22c3f138ec97e8227252b48c3b4e52196c7c1a603d27ff11ee7d4d170d9858f19b74a9082796acf4aa643de71f61d48c", 0xc6}, {&(0x7f00000011c0)="e69d47f452c8c097913f42d8b9b5d422d86996bfa9c71c308c528f4520c2", 0x1e}], 0x5, &(0x7f0000001280)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x30}}, {{&(0x7f00000012c0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001340)="7850dc18758b952566e95fc2c981f051500e39f86c09a5d471cca114cf1c03fef20e4f63066542929926d559", 0x2c}, {&(0x7f0000001380)="c8be459e0a4c43f1667f85fe69ce77ad30448a31b48828ed625a7d6a27ffc1251c6a5e9375097ce9ab3d2d9b19397090c1d8fda51a409f2272eb7f07a9df433cbe2432cbb1be7a55edf42c13d468ea3ca4a622013b9280b11a273b409f08c2f08040837b7e96038b83e28b385feedb444db7a3fec608ce0e30182595d775c95c8bc9726c698c9951b3953e2a7cf031c5eeb2f7647866619eb17a7e1b60e0b4374a13e59e", 0xa4}, {&(0x7f0000001440)="a6cb2b9d32", 0x5}, {&(0x7f0000001480)="123b91c7990c1093e6e61bafa078c8726b353d97a090c1946d98c6e335e8f34d3c5a782a30e1aa42372270858cf1597d74b3edcc1f3ec83795c56bdd0ce1986b5f1350acb34b5764430f5d91af8313828096960c1dea31d1a67f58013c815fd791a1bafe2ab5aee53285b68f65", 0x6d}], 0x4, &(0x7f0000001540)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xbe}}], 0x30}}], 0x4, 0x0) setxattr$security_evm(&(0x7f0000001740)='./file0\x00', &(0x7f00000038c0)='security.evm\x00', &(0x7f0000003900)=@sha1={0x1, "36ba4ec31bab07162df7f41ec5938c394d5e436d"}, 0x15, 0x2) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000540)='/dev/bsg\x00', 0x40403, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000001700)={0x89, 0x1, [], [@enc_lim={0x4, 0x1, 0xb0}, @jumbo={0xc2, 0x4, 0x200}]}, 0x18) ftruncate(r0, 0x80006) r3 = socket$inet6(0xa, 0x4, 0x100) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000003a80)={{0x0, 0x7f}, 'port0\x00', 0x88, 0x120808, 0xbf, 0x10000, 0xd1, 0x10001, 0x7fffffff, 0x0, 0x4, 0x4c}) sendto$inet6(r3, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f0000003a40)={r5, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0]}) sendfile(r3, r4, 0x0, 0xff7ffffe) ioctl$NBD_SET_SIZE(r4, 0xab02, 0x3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000200)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000003940)="693ccf80d6be303136e75459b3721f4e1ea898414a65546d6af347402e49afe16475d6248c0fa427e9cdd808628d846097ebe1880457c6a0ccb761b23686c8909208672b388c3f18ec4143d8f107bd0bfbc932b573cca731b76374fcd4f5b0a23495488382084d7a27eca7c25e44eb2cda0216705f77747a3d287c1aa6ee6cda65566db2cc63c8b4d41be0050b33be2604da3ac5fa641c38e2f8c37d3607cf6641cb4b47f05b2fa491aa8ea56d6bc919ae3e78422e12470b9a2aee59a315a0a11826fda76543e74135f3c326", 0xcc}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 462.098406] BTRFS error (device loop5): open_ctree failed 06:02:58 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) dup3(r2, r3, 0x0) 06:02:58 executing program 0: getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 462.200016] FAULT_INJECTION: forcing a failure. [ 462.200016] name failslab, interval 1, probability 0, space 0, times 0 [ 462.218615] CPU: 1 PID: 10055 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 462.226504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.235968] Call Trace: [ 462.238548] dump_stack+0x1b2/0x283 [ 462.242182] should_fail.cold+0x10a/0x154 [ 462.246323] should_failslab+0xd6/0x130 [ 462.250287] __kmalloc+0x2c1/0x400 [ 462.253821] ? device_list_add+0x5bb/0x8f0 [ 462.258049] device_list_add+0x5bb/0x8f0 [ 462.262104] ? btrfs_rm_dev_replace_free_srcdev+0x2d0/0x2d0 [ 462.267811] btrfs_scan_one_device+0x24a/0x330 [ 462.272383] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 462.277396] ? device_list_add+0x8f0/0x8f0 [ 462.281637] btrfs_mount+0x528/0x2838 [ 462.285444] ? pcpu_find_block_fit+0x2ed/0x380 [ 462.290020] ? pcpu_alloc+0x37d/0xf70 [ 462.293817] ? btrfs_remount+0x10c0/0x10c0 [ 462.298051] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 462.303493] ? rcu_read_lock_sched_held+0x10a/0x130 [ 462.308502] ? pcpu_alloc+0xe1/0xf70 [ 462.312213] ? __lockdep_init_map+0x100/0x560 [ 462.316699] ? __lockdep_init_map+0x100/0x560 [ 462.321188] mount_fs+0x92/0x2a0 [ 462.324569] vfs_kern_mount.part.0+0x5b/0x3c0 [ 462.329061] vfs_kern_mount+0x3c/0x60 [ 462.332854] btrfs_mount+0x2a0/0x2838 [ 462.336652] ? _find_next_bit+0xdb/0x100 [ 462.340706] ? pcpu_alloc+0x37d/0xf70 [ 462.344506] ? btrfs_remount+0x10c0/0x10c0 06:02:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000080)={0x9, 0x5, 0x3e, 0x200, 'syz0\x00', 0x4}) [ 462.348742] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 462.354187] ? rcu_read_lock_sched_held+0x10a/0x130 [ 462.359195] ? pcpu_alloc+0xe1/0xf70 [ 462.362900] ? pcpu_find_block_fit+0x380/0x380 [ 462.367462] ? __lockdep_init_map+0x100/0x560 [ 462.371948] ? __lockdep_init_map+0x100/0x560 [ 462.376489] mount_fs+0x92/0x2a0 [ 462.379855] vfs_kern_mount.part.0+0x5b/0x3c0 [ 462.384339] do_mount+0x3c9/0x25e0 [ 462.387874] ? copy_mount_string+0x40/0x40 [ 462.392096] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 462.396915] ? copy_mnt_ns+0x8a0/0x8a0 [ 462.400778] ? copy_mount_options+0x1ec/0x2e0 [ 462.405244] ? copy_mnt_ns+0x8a0/0x8a0 [ 462.409104] SyS_mount+0xa8/0x120 [ 462.412532] ? copy_mnt_ns+0x8a0/0x8a0 [ 462.416433] do_syscall_64+0x1d5/0x640 [ 462.420318] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 462.425491] RIP: 0033:0x45f57a [ 462.428693] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 462.436372] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 462.443613] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 06:02:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = dup(r0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000200)={0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 462.450854] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 462.458093] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 462.465421] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) 06:02:59 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:02:59 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, r3, 0x0) 06:02:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x364, 0xa, 0xa, 0x307, 0x0, 0x0, {0xc}, [@NFTA_SET_DESC={0x278, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x110, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x33c6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3f}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xcb}]}, {0x54, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x72}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9b37}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5a19}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xa0de}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffff9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x200}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4f53}]}]}, @NFTA_SET_DESC_SIZE={0x8}, @NFTA_SET_DESC_CONCAT={0x13c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x913}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7ff}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8001}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xbb4d}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x720}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x40}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x74da}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x200}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_USERDATA={0xb9, 0xd, 0x1, 0x0, "754f81b739e07efaee4eef4295d678963921d70194e644e0f0571291991426f38e8d0f13d58deee8289acf878dcae08e4879eec830c5c1f98968aff9162094c4e14483783cded7b1de3ee37ccb8e625b3462e18fbef1610eb5b79509e40d612b50949bc194ad32127ebfd277839c9a1bfad5da2a5daa6aa0b3bd95c359b373d550d85910a1e091e952f034e6df63bca674c2e4693022757a445919ff42ec6f1145723009ebc53e75360ffb5aaa2a86b87fdfc9b189"}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x9}]}, 0x364}, 0x1, 0x0, 0x0, 0x800}, 0x48080) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_PIT(r4, 0x8048ae66, &(0x7f0000000200)={[{0x7, 0x1, 0x30, 0x1, 0x7, 0x80, 0x1, 0x1f, 0x6, 0xbf, 0x20, 0x6, 0xffffffffffffff7c}, {0x5, 0x1, 0x5, 0x81, 0x1, 0x80, 0x4, 0x1, 0x1f, 0x1, 0x0, 0xff, 0x710}, {0x1, 0x1, 0xa7, 0x40, 0x20, 0xff, 0x6, 0x6, 0x0, 0x8, 0x2, 0x9, 0x4}], 0x7f}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 462.858377] FAULT_INJECTION: forcing a failure. [ 462.858377] name failslab, interval 1, probability 0, space 0, times 0 [ 462.888606] CPU: 0 PID: 10090 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 462.896487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.905829] Call Trace: [ 462.908410] dump_stack+0x1b2/0x283 [ 462.912038] should_fail.cold+0x10a/0x154 [ 462.916195] should_failslab+0xd6/0x130 [ 462.920163] __kmalloc+0x2c1/0x400 [ 462.923701] ? device_list_add+0x5bb/0x8f0 [ 462.927928] device_list_add+0x5bb/0x8f0 [ 462.931981] ? btrfs_rm_dev_replace_free_srcdev+0x2d0/0x2d0 [ 462.937689] btrfs_scan_one_device+0x24a/0x330 [ 462.942264] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 462.947269] ? device_list_add+0x8f0/0x8f0 [ 462.951502] btrfs_mount+0x528/0x2838 06:02:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x80006) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)={{0x77359400}}) stat(&(0x7f0000001100)='./bus\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000200)="4f3030eaae73f7edb271652d48dd46d16edc7ab674b3fd9ff966142a5c5ae621c3677e3c3f130a00c9a9a9292b1dd8c62751c954b7001d4635e5ee09a02efaf41f17ae633514234a1304ecb4c69519314708d50c7328fb768803121dfa6b23f34684a93fd0b3c7a6e3435d8e39b7d234d5f9cca1149c211a91f4aa6efaa1d5f463e2cb389fdb93e50290556d6c7362b00aa7fee07c9a11", 0x97}, {&(0x7f0000000340)="4d2bf0acff338876259da7b0f394f7067cc270cec79566bffe119c1e904e7c61467e6885dd09dd83459807dcd84747cfea3bef338c0545757b5015e5771798d62cf4380b4a27849e1fa7538bd385b99d0adf8df34b82de7f214f8263e2256a657f8a9d0c302731bafcc40736df641505efbc5b51f37333aabcfba382c8a19fdb9c5665cf8ecd42d0f366fd94df3f23a40466bbe52ae7a624e57cd7b85f45c226097d9af1656a", 0xa6}, {&(0x7f0000000400)="acb92627b4b367face472e7c252f1c7be1a224011b62386b1c776594f0b680b6f930b731c9af79ad09edf63716d2d2889621f896e844ed381b1d58286cb08a", 0x3f}], 0x3, &(0x7f00000004c0)=[@cred={{0x1c}}], 0x20, 0x20000001}, {&(0x7f0000000500)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000580)="471e870d723a500078ab648e8d6a70f658f9c08e493887675d7d910e3a7353cc9bd7ea98c481f3131d40262b06daffd7d4ef5f3da0565ced079affa50ace4fff03a2927b2ead8803586d2a9f982fdf22c2fdc7e385e92c39a7dc0eabb7158b2a83b9442f94439a3d17b6466516c049cc4c95db8442732e0121f580ed5584b0e367228745190996a3c9b36c43536831ea59ab87242b56f851f007e40bebe0e87fbaff4a4fcc3c85bf334795f814c84e798d", 0xb1}, {&(0x7f0000000640)="6584be807a5a5b489299c0db9797ef7c975d65f8c1854564b68cb6842f14064717ae47b7db46177983deb1fe5092c24a9b45bad7545d08e58099e0e402dba1ed1de4ded1422fa780d985dd4c7f11bfe10f8a07692f2921b0f15d90e3271e3717043b5d29e3832818aa30f570e79c3cca3a8c", 0x72}, {&(0x7f00000006c0)="483e88b89f16be2b08359a509991ebea9c26e7a4d0518ddae57ced927006274ff8f225142655865077dcef5e66a46b6b3a172d1af6d5a970465384dd451be189e48a0d4a4dc7480d72dfda4956deded365bac63826450ceade9dcfe635cb2d933f8f04f456a79b9b2612e89d48766d2b7295a595500aeeb58cdf4ba3d9466075c46b8968941af5ba674755a30dce11401294d0623c1cfb5a3f298ce4655390f9188694ec1b527c680bc7b3bb045d4df98a569c97083b3ebf486df4aaa63080984589be5934dffcc387f16e9d1aef1c5967524a96454fde4ca4788c4d0cae02e1e255617de6ebadaa6d89b70e", 0xec}, {&(0x7f00000007c0)="333779830a3620729d746efcd3c9652f1c6eac84c597a65f635397d08e7125f7d2c186f374537ee5bce3b18a615c923ba978e2eb07a0a8e3914870f1bba366360888b4ac8fb9d79ca4d7854e2aae661d16d0c8a4988bec2ea331d49dbd65ad785e1af3c4809e1a6320f70aa35b3d6afc1ef990c1a037fd19fc4a1b3e254323d2c892e599d24456aa3e2da14196254bcfda56122dd57473cdec7c706534d013ed3c846f229ef4bf9eaeff96db983d4be6c88777ab91ab09689136c36bff136674857a06dc199cfeb99ef051e1bd51a7270066cea905c9f294ea466d984ba2f721887c51", 0xe3}, {&(0x7f00000008c0)="b49afc0ed7beab23d92263ee606712e5bedce4ec16dd110b8d295d3c2ae8fa3ec2824599ea2015736c8169799b3010c0bb5086a3bc86aa1b80417633e830637796f6", 0x42}, {&(0x7f0000000940)="321649487a54dba7068c553781c15dd0cf6e3f2ed56b51f9bc71e5ed28f5512a7f7bc20c965f2a38a509209dfebadcef898987d84aa03ee973d48efbd4cadffb0e29cdec99c19da3ac64975c456b55915b3ded29549945e13491f2c5d7ff7837aeaf2c6a72cabbb8f9bf28caa6221a1d00a73a91b70af1832d24aa1ee31340014eab50b19dd2c791b970663dcc108ed9e032771b1e4b824dafd1d6b8f3", 0x9d}], 0x6, &(0x7f0000000ac0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x100}, {&(0x7f0000000b00)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000b80)="9fa7d414ec79aaa98e207b2deaf65a8d07064feea00349d39762dccb86a41faddb66b7a6636d16eac45dd8a34199afb6acf8222cd0260169b306417d0afe3e905e2a62d53e1c723fba21cb8fe424bf347c227fffd1bc2e7dc08b0595fd17d8a8eb61cafea7a13c1b894ab7c0893d74751e5c1e3ba45d9ec5a7a151b04a65443bdd6bd327f49306941a3033ba1684eb97251c45f526", 0x95}, {&(0x7f0000000c40)="c79959529988bff17bf8f099f39897e96c2e64d39a9bb28ef2761b005a9b9c2c941fd9eff23cd7518c5b3d3b3fb3d7406c87da46eb450c7a7e5482369dbe922826acd2f6311e16f78ecb1914a38aaea444d33dc68218fcaaf871d4c936c1e22d8a7864c3e1e7a087570c1a58f5cc26860e5cd5871c9ca1a3655583c97c8ea0cb1cd6edde5246390fef6b8df3fb9dfd8af00e64378eade3209c2e527250a6ecc2aca126763eef3a808208d85821af6345884cab9a8c61298560121c66e8e77566272256738c05fbdf26af8d93", 0xcc}, {&(0x7f0000000d40)}], 0x3, &(0x7f00000011c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r0, r2}}}, @cred={{0x1c, 0x1, 0x2, {r4, r6, r8}}}], 0x138, 0x24040810}], 0x3, 0x840) [ 462.955295] ? pcpu_find_block_fit+0x2ed/0x380 [ 462.959865] ? pcpu_alloc+0x37d/0xf70 [ 462.963654] ? btrfs_remount+0x10c0/0x10c0 [ 462.967888] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 462.973343] ? rcu_read_lock_sched_held+0x10a/0x130 [ 462.978353] ? pcpu_alloc+0xe1/0xf70 [ 462.982057] ? __lockdep_init_map+0x100/0x560 [ 462.986538] ? __lockdep_init_map+0x100/0x560 [ 462.991035] mount_fs+0x92/0x2a0 [ 462.994397] vfs_kern_mount.part.0+0x5b/0x3c0 [ 462.998887] vfs_kern_mount+0x3c/0x60 [ 463.002681] btrfs_mount+0x2a0/0x2838 [ 463.006467] ? _find_next_bit+0xdb/0x100 [ 463.010523] ? pcpu_alloc+0x37d/0xf70 [ 463.014304] ? btrfs_remount+0x10c0/0x10c0 [ 463.018510] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 463.023937] ? rcu_read_lock_sched_held+0x10a/0x130 [ 463.028932] ? pcpu_alloc+0xe1/0xf70 [ 463.032636] ? pcpu_find_block_fit+0x380/0x380 [ 463.037196] ? __lockdep_init_map+0x100/0x560 [ 463.041659] ? __lockdep_init_map+0x100/0x560 [ 463.046126] mount_fs+0x92/0x2a0 [ 463.049472] vfs_kern_mount.part.0+0x5b/0x3c0 [ 463.053941] do_mount+0x3c9/0x25e0 [ 463.057456] ? copy_mount_string+0x40/0x40 [ 463.061664] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 463.066480] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.070342] ? copy_mount_options+0x1ec/0x2e0 [ 463.074806] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.078752] SyS_mount+0xa8/0x120 [ 463.082178] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.086036] do_syscall_64+0x1d5/0x640 [ 463.089903] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.095065] RIP: 0033:0x45f57a [ 463.098250] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 463.105929] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 463.113173] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 463.120419] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 463.127685] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 463.134942] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:02:59 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 463.216670] FAULT_INJECTION: forcing a failure. [ 463.216670] name failslab, interval 1, probability 0, space 0, times 0 [ 463.233015] CPU: 1 PID: 10121 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 463.240977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.250326] Call Trace: [ 463.252905] dump_stack+0x1b2/0x283 [ 463.256534] should_fail.cold+0x10a/0x154 [ 463.260686] should_failslab+0xd6/0x130 [ 463.264645] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 463.269288] btrfs_mount+0xf1e/0x2838 [ 463.273061] ? pcpu_find_block_fit+0x2ed/0x380 [ 463.277620] ? pcpu_alloc+0x37d/0xf70 [ 463.281393] ? btrfs_remount+0x10c0/0x10c0 [ 463.285602] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 463.291023] ? rcu_read_lock_sched_held+0x10a/0x130 [ 463.296014] ? pcpu_alloc+0xe1/0xf70 [ 463.299708] ? __lockdep_init_map+0x100/0x560 [ 463.304206] ? __lockdep_init_map+0x100/0x560 [ 463.308694] mount_fs+0x92/0x2a0 [ 463.312055] vfs_kern_mount.part.0+0x5b/0x3c0 06:03:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x200007f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000000200)="2a3391ecea2c28a001db82b919cbde638894baad8708f2f6a1c62a1ad8bfb7c69488e2d7d5a0340f512dba479bc5fa6cecb3005a", 0x34}, {&(0x7f0000000480)="b0e0c0ffe271ad5837915ceedbbb982fe502dd8c83ee8c798b4af1c3d8a6b37ac920037028f34ea1cedc54d8674636b2bcf6d3662238edbceb66e622af8f54c0ac3bbd83d7fc67a36a8ab52c4ef7cc42a718fba3470aeb1ed16697e771c8a39f9fc74b0f0872d2bc843d7f2d7c393f5a652ee76c2b9de45638d9a586e431e3910f28f14a9961d54df4ad0e71a4646986037f11de79595b017d73d94275f28155d8126f59132e975d4104c3da9b8bfde159b2cfb18c5b8f61b93be39dba0e3163b73a32f5eb06d71f1c6f549cb852f24cd76798bf10f0ebe33fac1822d52434c8e72037a7b0e0864a", 0xe8, 0x4}], 0x5, 0x0) 06:03:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x4e1f, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b80000000f076ab24a5686223050add", 0x2a}, {&(0x7f0000000380)="64bdf0c9349ff6ec083ba082585775adad1d1499f8a5a939ccf560aac9ce2bda0b505e5f7057d6cca9659ef345c7e969a2983d1e2a33b71a5c9aa1bf65f2f3df075d94b779e68c538dc330cfdb2609418afa364bdc81f1765c973a66610c7545710d3ebb08fa2025de175d5c6ee5542320d353a5af83b4b0d8c5cc", 0x7b}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000000480)=ANY=[@ANYBLOB="280000000900000000000000070000008616000000030010cc2bc71ea03ab2efe7dd215d4f91bf858d7b61724d0a2c61ba299b7518f9000011000000000000000000000001afcf0000002000000000000000110000000000000000000000010000000100000000000000f333376c129f8d52b99e8ca06f5603f0e44fe4e0ea2b6db4f575d6227e0af074612bcd6cc12503509063da3ee147a017a81f048c8f2f0ce2a008957196b4402ace377bfc49d9651b3da2b8e25b2a19b6c7e88d457335634f97f1177e8fb8ac41484cb7e74a36284250e8428d4246cb474e9300"], 0x58}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 463.316544] vfs_kern_mount+0x3c/0x60 [ 463.320336] btrfs_mount+0x2a0/0x2838 [ 463.324123] ? pcpu_find_block_fit+0x2ed/0x380 [ 463.328697] ? pcpu_alloc+0x37d/0xf70 [ 463.332486] ? btrfs_remount+0x10c0/0x10c0 [ 463.336719] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 463.342161] ? rcu_read_lock_sched_held+0x10a/0x130 [ 463.347167] ? pcpu_alloc+0xe1/0xf70 [ 463.350899] ? pcpu_find_block_fit+0x380/0x380 [ 463.355490] ? __lockdep_init_map+0x100/0x560 [ 463.359979] ? __lockdep_init_map+0x100/0x560 06:03:00 executing program 0: setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L+', 0xf7f}, 0x16, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x7fffffff, 0x204040) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000480)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b9f0703344be7f1074516f6eea9a4134a988823e95e2b168f2b0f45ebf755b8d212f54f247e47210f257f4a0f25facc6f697f98c05cb39797a0f2161e9f3133f8e7a2edc9ddc12a39f45cda8c49f5b493ac6373eb0b0082eff1c43d341de9027db52b4642bdaa078c9f2f13a926f8584400"/177, 0xb1}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000900)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E\xaf\x9dXZ\xc0\xd5\v\xe6\x9aR\xde8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9ao$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1af5eff25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b64d2e25f348b729db5ccf8a8c7713215d64eefe6d3616c820f6b00"/84, @ANYRES16=r1, @ANYBLOB="46862bbd7000ffdbdf250200000c1eb3e475f200"/35], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020028bd7000fbdbdf250202000100000008000100020000004c0004800800020003000000d5000c80e40005000000000000000000fff7000000"], 0x238}, 0x1, 0x0, 0x0, 0x40040}, 0x2004c010) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="000000013eadca4065d99ad7cdb3c37ab60ea42c17d1f4556290686e833613c69010b0dbf0deeb202cfa4be092eaaf2142f7974f7c1f988377bdb0307c6804b4f589d214017c5217cae84989241b08e8ed62157eb51c25fe000000003bae4c88bad50000000000", @ANYRES16=r1, @ANYBLOB="00032cbd7000fbdbdf2502000000080001000300000008000200060000001c0108801c00078008000600f900000054000780080005009ce7951908000500856f8165080006005b00000008000600a0000000080005003f6c6852080005001ed4602e08000500a5124e2208000600e000000008000500af11974808000600cb000000340007801c0007800800050057a4520d080006007f0000000800050073fa0f77040007802400078008000600dc0000000800060040000000080005009c9a9172080005001a46ee622c000780080005003e58a23b08000500f42337300800060052000000080006004a000000080005008411514c1400078008000500a863b06008004b0000000000"], 0x140}, 0x1, 0x0, 0x0, 0x4004804}, 0x20044000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x1ac, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x88, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9abb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x105f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e6524ed}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42a74475}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x9c1d2d0}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc58d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36e11d6c}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42876c22}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f75543}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x14378d34}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6562eb20}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x231a3a29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x428f1395}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3137}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf8, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c68dea}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d11c120}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4cd9c2e2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfe}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x25abb36d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1242b9c1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5c4e14b4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xefcb8e0}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x98}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x616f4c0c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbe}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x158c3f91}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ec4792}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d8d80d1}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x245f9576}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x682c4067}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x28d4d31d}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4d31dff5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x141aa403}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22aa0963}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x44000}, 0x8800) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00012abd7000fcdbdf25e1ffffff0700010002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4040000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xfffffffffffffff8, &(0x7f0000000040)={&(0x7f00000008c0)={0xb8, r1, 0x400, 0x70bd2d, 0x25dfdbff}, 0xfffffffffffffe82}, 0x1, 0x0, 0x0, 0x40001}, 0x800) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, r1, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4090) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x2c4, r1, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x104, 0xc, 0x0, 0x1, [{0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x369597ea}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1326a101}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x364a4bc9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeca0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x631ab2ea}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbf39}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d420d27}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7aac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1fee3f85}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8708a5}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x328b}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e25e9be}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7baa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x643d0b65}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x973f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc249956}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf134}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc059}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x27a09a1e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x827e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6193fc4c}, @NLBL_CIPSOV4_A_MLSCATREM={0x4, 0xa, 0xb4c8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xe196f20}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6169325f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x10c85324}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x48cebb5e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xce3a34e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5b29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x159bf453}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x31e5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0xb8, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x918a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x191b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x40ca}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7792376e}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b9ddf83}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x373950f0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2a3c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x61a5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x67bf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x65e32e27}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x49651caf}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7e7a}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x72da}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x568e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xde15}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4536}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x41b5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x454178a3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xba4ba44}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46ff70da}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60816cdc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8f2ea26}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63d82734}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x34cb4a57}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9a72}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3788d28}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x817e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x528b3b46}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xce57}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2cda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x66f1fcd0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7929141e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4576}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1d89}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b56cd77}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x50a2fe8f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x61}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3023d08c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7d1f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x49bbc57f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12efa539}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a4d0bf4}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040095) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x70, r1, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x44, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7e3965c8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x90}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1848d5c1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd050bc1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xade1897}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a777f83}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x80) [ 463.364459] mount_fs+0x92/0x2a0 [ 463.367816] vfs_kern_mount.part.0+0x5b/0x3c0 [ 463.372317] do_mount+0x3c9/0x25e0 [ 463.375877] ? copy_mount_string+0x40/0x40 [ 463.380086] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 463.384899] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.388769] ? copy_mount_options+0x1ec/0x2e0 [ 463.393249] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.397123] SyS_mount+0xa8/0x120 [ 463.400582] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.404462] do_syscall_64+0x1d5/0x640 [ 463.408345] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.413526] RIP: 0033:0x45f57a 06:03:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvfrom(r0, &(0x7f0000000340)=""/134, 0x86, 0x20002022, &(0x7f0000000480)=@in6={0xa, 0x4e21, 0x6, @local, 0x1}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000200)="de718e1277e2d94d9d9e7e1e9f70dd495cbb6ff4cd9394d6201e8acf019b3132ee2ef1b4a290ff8bf1bac9c67bda7bc234b93b629418c5b0eacd78246488e9baf39d8b86caf25aac5389b593a0edbb96f632428049d7d3ccac7bd1afacb4ab2a67fe49809f878d2688d5f491e469735385fcf080b67e4b95eb60235ed6675e891c24006a6cd87641fd4ce369fa1980641256585d8f518e9c62451a39bbace898c6f01efb1b48b640c0563258aa", 0xad}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:00 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) dup3(r2, r3, 0x0) [ 463.416709] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 463.424411] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 463.431669] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 463.438926] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 463.446182] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 463.453438] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:00 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 463.565754] FAULT_INJECTION: forcing a failure. [ 463.565754] name failslab, interval 1, probability 0, space 0, times 0 [ 463.587493] CPU: 0 PID: 10158 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 463.595378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.604721] Call Trace: [ 463.607305] dump_stack+0x1b2/0x283 [ 463.610935] should_fail.cold+0x10a/0x154 [ 463.615090] should_failslab+0xd6/0x130 [ 463.619065] kmem_cache_alloc+0x28e/0x3c0 [ 463.623212] getname_kernel+0x4e/0x340 [ 463.627096] kern_path+0x1b/0x40 [ 463.630458] lookup_bdev.part.0+0x60/0x160 [ 463.634691] ? blkdev_open+0x250/0x250 [ 463.638555] ? btrfs_read_dev_super+0x74/0xa0 [ 463.643022] blkdev_get_by_path+0x70/0xf0 [ 463.647152] btrfs_get_bdev_and_sb+0x33/0x2d0 [ 463.651621] ? fs_reclaim_acquire+0x10/0x10 [ 463.655914] __btrfs_open_devices+0x175/0xa40 [ 463.660394] ? find_device+0x100/0x100 06:03:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) [ 463.664284] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 463.669727] btrfs_open_devices+0x98/0xb0 [ 463.673867] btrfs_mount+0x10a2/0x2838 [ 463.677749] ? pcpu_find_block_fit+0x2ed/0x380 [ 463.682325] ? pcpu_alloc+0x37d/0xf70 [ 463.686116] ? btrfs_remount+0x10c0/0x10c0 [ 463.690343] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 463.695781] ? rcu_read_lock_sched_held+0x10a/0x130 [ 463.700771] ? pcpu_alloc+0xe1/0xf70 [ 463.704459] ? __lockdep_init_map+0x100/0x560 [ 463.708926] ? __lockdep_init_map+0x100/0x560 [ 463.713394] mount_fs+0x92/0x2a0 [ 463.716737] vfs_kern_mount.part.0+0x5b/0x3c0 [ 463.721221] vfs_kern_mount+0x3c/0x60 [ 463.724992] btrfs_mount+0x2a0/0x2838 [ 463.728770] ? _find_next_bit+0xdb/0x100 [ 463.732806] ? pcpu_alloc+0x37d/0xf70 [ 463.736585] ? btrfs_remount+0x10c0/0x10c0 [ 463.740796] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 463.746219] ? rcu_read_lock_sched_held+0x10a/0x130 [ 463.751203] ? pcpu_alloc+0xe1/0xf70 [ 463.754890] ? pcpu_find_block_fit+0x380/0x380 [ 463.759441] ? __lockdep_init_map+0x100/0x560 [ 463.763905] ? __lockdep_init_map+0x100/0x560 [ 463.768369] mount_fs+0x92/0x2a0 [ 463.771709] vfs_kern_mount.part.0+0x5b/0x3c0 [ 463.776175] do_mount+0x3c9/0x25e0 [ 463.779689] ? copy_mount_string+0x40/0x40 [ 463.784010] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 463.788827] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.792697] ? copy_mount_options+0x1ec/0x2e0 [ 463.797165] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.801033] SyS_mount+0xa8/0x120 [ 463.804462] ? copy_mnt_ns+0x8a0/0x8a0 [ 463.808323] do_syscall_64+0x1d5/0x640 [ 463.812187] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 463.817350] RIP: 0033:0x45f57a [ 463.820513] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 463.828231] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 463.835473] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 463.842720] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 463.849962] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 463.857228] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:00 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 06:03:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x10, r1, 0x9) [ 463.885640] BTRFS error (device loop5): superblock checksum mismatch 06:03:00 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x28000, 0x0) timerfd_gettime(r0, &(0x7f00000000c0)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r2, 0x80006) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000340)=0x1, 0x4) getpeername$l2tp6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000240)=0x20) ftruncate(0xffffffffffffffff, 0x100000001) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f0000000380)={0x88, 0x20, &(0x7f0000000500)="517fdc4f442408ae6fad2bfc399ea679ce2d2383cdb44aef680d9ff2f9163a94bc4febab26702eae091e5156b3f58ea809e6739dd1c1383d8f4d4c8b1b1324ffad9592c94ce0da24f0b815ebc7bf41628f9dca0d2a70f5f3bb551ef54c7ff32cd36120bd720ddc2fb811634d735762af856ba5d6e7434524ee2213b867c150be3a51a24659a37dad94c7db9e33549f0ccee65b8ceaaf81", {0x40, 0x9, 0x20303159, 0x2, 0x400, 0x7, 0x3, 0xc0000000}}) r4 = gettid() r5 = socket(0x11, 0x800000003, 0x8) bind(r5, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$CAIFSO_REQ_PARAM(r5, 0x116, 0x80, &(0x7f0000000280)="90ce84ea4bb650ddf442d1662771eb24a46b631ac6c1c105616f92", 0x1b) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) recvfrom(r3, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000180)={0xa10000, 0x800, 0x9, r3, 0x0, &(0x7f0000000140)={0x990a5e, 0x8, [], @p_u8=&(0x7f0000000100)=0x2}}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x1f}], 0x0, 0x0) 06:03:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) accept$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000340)={0x3a0, 0x4, 0x4, 0x400, 0x6, {}, {0x0, 0x1, 0x1, 0x3, 0x40, 0x20, "8bb7b44d"}, 0x9, 0x2, @fd, 0x81}) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r4) recvfrom(r3, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) setresuid(r2, r5, r7) 06:03:00 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) dup3(r2, r3, 0x0) [ 464.021234] print_req_error: I/O error, dev loop2, sector 0 [ 464.037644] BTRFS error (device loop5): open_ctree failed 06:03:00 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 464.109056] FAULT_INJECTION: forcing a failure. [ 464.109056] name failslab, interval 1, probability 0, space 0, times 0 [ 464.124692] CPU: 1 PID: 10215 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 464.132577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.141916] Call Trace: [ 464.144501] dump_stack+0x1b2/0x283 [ 464.148147] should_fail.cold+0x10a/0x154 [ 464.152295] should_failslab+0xd6/0x130 [ 464.156264] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 464.160921] btrfs_mount+0xf1e/0x2838 [ 464.164700] ? pcpu_find_block_fit+0x2ed/0x380 [ 464.169263] ? pcpu_alloc+0x37d/0xf70 [ 464.173058] ? btrfs_remount+0x10c0/0x10c0 [ 464.177289] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 464.182727] ? rcu_read_lock_sched_held+0x10a/0x130 [ 464.187743] ? pcpu_alloc+0xe1/0xf70 [ 464.191444] ? __lockdep_init_map+0x100/0x560 [ 464.195911] ? __lockdep_init_map+0x100/0x560 [ 464.200378] mount_fs+0x92/0x2a0 [ 464.203745] vfs_kern_mount.part.0+0x5b/0x3c0 [ 464.208212] vfs_kern_mount+0x3c/0x60 [ 464.211983] btrfs_mount+0x2a0/0x2838 [ 464.215755] ? pcpu_find_block_fit+0x2ed/0x380 [ 464.220317] ? pcpu_alloc+0x37d/0xf70 [ 464.224087] ? btrfs_remount+0x10c0/0x10c0 [ 464.228296] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 464.233718] ? rcu_read_lock_sched_held+0x10a/0x130 [ 464.238726] ? pcpu_alloc+0xe1/0xf70 [ 464.242426] ? pcpu_find_block_fit+0x380/0x380 [ 464.246982] ? __lockdep_init_map+0x100/0x560 [ 464.251444] ? __lockdep_init_map+0x100/0x560 [ 464.255910] mount_fs+0x92/0x2a0 [ 464.259246] vfs_kern_mount.part.0+0x5b/0x3c0 [ 464.263712] do_mount+0x3c9/0x25e0 [ 464.267227] ? copy_mount_string+0x40/0x40 [ 464.271449] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 464.276259] ? copy_mnt_ns+0x8a0/0x8a0 [ 464.280119] ? copy_mount_options+0x1ec/0x2e0 [ 464.284582] ? copy_mnt_ns+0x8a0/0x8a0 [ 464.288439] SyS_mount+0xa8/0x120 [ 464.291857] ? copy_mnt_ns+0x8a0/0x8a0 [ 464.295714] do_syscall_64+0x1d5/0x640 [ 464.299590] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 464.304746] RIP: 0033:0x45f57a 06:03:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000200)="ed71a1e8b630c0ebf0bbe614ccbeef36e8f8e1447306361a049ff504239b", 0x1e}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(0xffffffffffffffff, r1, 0x0, 0xff7ffffe) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000380)={0x73622a85, 0x110b}) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r2, 0x0, 0xff7ffffe) r3 = socket(0x11, 0x800000003, 0x8) finit_module(r3, &(0x7f0000000180)='bbr\x00', 0x1) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet6_tcp_int(r3, 0x6, 0x3, &(0x7f0000000280), &(0x7f0000000340)=0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000240)={0xa, 0x4}, 0xc) [ 464.307917] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 464.315596] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 464.322838] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 464.330083] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 464.337330] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 464.344571] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:01 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, 0xffffffffffffffff, 0x0) 06:03:01 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 464.451368] FAULT_INJECTION: forcing a failure. [ 464.451368] name failslab, interval 1, probability 0, space 0, times 0 [ 464.476752] CPU: 1 PID: 10233 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 464.484629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.493974] Call Trace: [ 464.496543] dump_stack+0x1b2/0x283 [ 464.500149] should_fail.cold+0x10a/0x154 [ 464.504273] should_failslab+0xd6/0x130 [ 464.508242] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 464.512901] btrfs_mount+0xf1e/0x2838 [ 464.516681] ? pcpu_find_block_fit+0x2ed/0x380 [ 464.521237] ? pcpu_alloc+0x37d/0xf70 [ 464.525034] ? btrfs_remount+0x10c0/0x10c0 [ 464.529246] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 464.534670] ? rcu_read_lock_sched_held+0x10a/0x130 [ 464.539673] ? pcpu_alloc+0xe1/0xf70 [ 464.543367] ? __lockdep_init_map+0x100/0x560 [ 464.547856] ? __lockdep_init_map+0x100/0x560 [ 464.552328] mount_fs+0x92/0x2a0 [ 464.555670] vfs_kern_mount.part.0+0x5b/0x3c0 [ 464.560140] vfs_kern_mount+0x3c/0x60 [ 464.563919] btrfs_mount+0x2a0/0x2838 [ 464.567696] ? pcpu_find_block_fit+0x2ed/0x380 [ 464.572253] ? pcpu_alloc+0x37d/0xf70 [ 464.576028] ? btrfs_remount+0x10c0/0x10c0 [ 464.580242] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 464.585667] ? rcu_read_lock_sched_held+0x10a/0x130 [ 464.590658] ? pcpu_alloc+0xe1/0xf70 [ 464.594350] ? pcpu_find_block_fit+0x380/0x380 [ 464.598907] ? __lockdep_init_map+0x100/0x560 [ 464.603375] ? __lockdep_init_map+0x100/0x560 [ 464.607845] mount_fs+0x92/0x2a0 [ 464.611192] vfs_kern_mount.part.0+0x5b/0x3c0 [ 464.615665] do_mount+0x3c9/0x25e0 [ 464.619182] ? copy_mount_string+0x40/0x40 [ 464.623410] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 464.628230] ? copy_mnt_ns+0x8a0/0x8a0 [ 464.632091] ? copy_mount_options+0x1ec/0x2e0 [ 464.636560] ? copy_mnt_ns+0x8a0/0x8a0 [ 464.640422] SyS_mount+0xa8/0x120 [ 464.643847] ? copy_mnt_ns+0x8a0/0x8a0 [ 464.647710] do_syscall_64+0x1d5/0x640 [ 464.651579] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 464.656741] RIP: 0033:0x45f57a [ 464.659903] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 464.667600] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 464.674843] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 464.682085] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 464.689337] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 06:03:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) [ 464.696610] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:01 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, 0xffffffffffffffff, 0x0) 06:03:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) syz_mount_image$reiserfs(&(0x7f0000000200)='reiserfs\x00', &(0x7f0000000240)='./file0\x00', 0x4, 0x8, &(0x7f0000000a40)=[{&(0x7f0000000380)="8368e8328663467a16afd49fe3e4137dfbd1d3ef2e5102a1c5c0a392376676822c13d485c0979e4e0bbaf39f2f87df7446c2bbf033d3f49b280f0668223b6002cb78c9fe45236182b3f2ab102b0245f50b771bb29281135756db375ba967f5976d333c", 0x63, 0x9}, {&(0x7f0000000480)="c241a190d024adf6f33fd5cedda578054fb093be26701d1614fc583893ad5cb6bb7f1249a49a28b10a6e482a7211ea87c0d211a8fba06cb9e0477a2610d460fabaffbad7638965dc844cc51f7e9860620647ff898087193feab98b16732324f1ba3bb3a1229246f8ecd7ee82add258e7c63b6d7a00a2318b28cf7112d451a70c2cfaf32abc25a863208c5ae955d5887c917abf4aecd3b72d22bf2b9c57d64eae8c67c476e2c21816d23e05a2562b9a6589ffc9e5f2636ec7606556172bcc09e9fb596189c70388d774d190ca956d1c5eaedb7e937964ed135991b0f32612fef723085aea3a653f3effd34db776bfdc6bbe14dd6d", 0xf4, 0x1}, {&(0x7f0000000640)="35aad5da8fc8b05a122aa20715c2305298aabb2eaaff77735219a2ddbf7b503464c1c7873ba087c057082af50559f2178e915229a3e4ceb653ac1bdf64e0ae8ce929afd9fae02fbc60647b3d087d7d9471f538a3820b13bd04fed64073c081d4367121", 0x63, 0x5}, {&(0x7f00000006c0)="26d4599769732be3807e6982c89fae9314d837c9de4c38133116c4a2afa14c9ea87c1ae83e18bd2bf72f719900ba1c307c1adcf1f1baffe49c57d4c3acc61a04618db40cc293fc837a46fe8ca5af9863f26c2263981f0f00ce9e186110fbc09b76f317107861abba746173ec9b7839623cdff96408325ed7b7797421480b", 0x7e, 0x1}, {&(0x7f0000000740)="5e7f47a689728e6b4dbece2770853793318d6eb10aa2f8f0ea20d9c15c3c3165d670957e210017d09557b5db9a82c7f1e7b57622492ffe52c65f6498b0af232900e9d78ea3c3c32059d4a2be039f1679114544d4b40fd0", 0x57, 0x3}, {&(0x7f00000007c0)="309f407f8b10568a97b2f8d2af7aa12d150bfb7a2c66c4aca48d29accd33b29550b1dbea2721ba471f05a79b3de956efa206d8403639e894124348bcc6e3a51208bf4afdb8d697b3579ded0b625c62626528918bf2e97054d81ea595599f28b611399844fe5d1bc23646a21ea0786e98d907", 0x72, 0x200000000}, {&(0x7f0000000840)="59fa511bcce159b56553ce8afc62cc021ce7828b36fd62818d6ee0c6355e0b9fff86bff2883460330befe193f8b4a9e17dd801966b2dac2dd30e4de9702d66d4a16575278ebecbf2f7b0d488eb5459e83927b2545d32e05991d7828adfd41d2f2aad2a4d5c5e031325fdc8c378b6b373bd2961a24a3bfee1fa96fdadfe869813a19250568d38edb103e9927cf5033624a1da7aa7da741a0f54c1b09dc25400e871abf4c5bfc729252cdd37ffbd2f066b4884e6fa11796325c8a97b9f28309ca197db6d7e335802e41a079fe7be5e2721a69131fc316f23f899065314bc182a13e0daf6d45a61350efefd", 0xea, 0x40}, {&(0x7f0000000940)="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", 0xfd, 0xfffffffffffffffc}], 0x10200d0, &(0x7f0000000b00)={[{@commit={'commit', 0x3d, 0x7ff}}, {@noacl='noacl'}], [{@uid_eq={'uid', 0x3d, r1}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot'}}, {@euid_gt={'euid>', r3}}]}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:01 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000001c0)={0x3b, @remote, 0x4e21, 0x4, 'lc\x00', 0x1, 0x8, 0x71}, 0x2c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2c001, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000c02000000000000000a03000006080005400000c00002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b00200000000000091eba38ad5eb14fd6b25007a0000000000fff6f2a229970900000000000000fd9a000001000000000001fffffff600", 0x48, 0x4000000010000}], 0x1000411, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000200)={@none, 0x81}) [ 464.836447] FAULT_INJECTION: forcing a failure. [ 464.836447] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 464.848481] CPU: 1 PID: 10262 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 464.856353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.865695] Call Trace: [ 464.868283] dump_stack+0x1b2/0x283 [ 464.871912] should_fail.cold+0x10a/0x154 [ 464.876059] __alloc_pages_nodemask+0x22b/0x2730 [ 464.880816] ? deref_stack_reg+0x8a/0xc0 06:03:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x14, r4, 0x536ae464467e3e0b, 0x0, 0x0, {0x21}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100025bd7000fddbdf2542000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7011e80000000500830000000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000500830000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x8040) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 464.884870] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 464.890755] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 464.895594] ? trace_hardirqs_on+0x10/0x10 [ 464.899829] ? lock_downgrade+0x6e0/0x6e0 [ 464.903978] cache_grow_begin+0x91/0x410 [ 464.908032] cache_alloc_refill+0x28c/0x360 [ 464.912349] kmem_cache_alloc+0x333/0x3c0 [ 464.916503] getname_kernel+0x4e/0x340 [ 464.920388] kern_path+0x1b/0x40 [ 464.923746] lookup_bdev.part.0+0x60/0x160 [ 464.927952] ? blkdev_open+0x250/0x250 [ 464.931830] ? btrfs_open_devices+0x22/0xb0 [ 464.936124] blkdev_get_by_path+0x70/0xf0 [ 464.940251] btrfs_get_bdev_and_sb+0x33/0x2d0 [ 464.944737] __btrfs_open_devices+0x175/0xa40 [ 464.949220] ? find_device+0x100/0x100 [ 464.953086] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 464.958526] btrfs_open_devices+0x98/0xb0 [ 464.962668] btrfs_mount+0x10a2/0x2838 [ 464.963556] IPVS: set_ctl: invalid protocol: 59 172.20.20.187:20001 [ 464.966551] ? pcpu_find_block_fit+0x2ed/0x380 [ 464.966560] ? pcpu_alloc+0x37d/0xf70 [ 464.966571] ? btrfs_remount+0x10c0/0x10c0 [ 464.985515] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 464.990951] ? rcu_read_lock_sched_held+0x10a/0x130 [ 464.995954] ? pcpu_alloc+0xe1/0xf70 [ 464.999669] ? __lockdep_init_map+0x100/0x560 [ 465.004157] ? __lockdep_init_map+0x100/0x560 [ 465.008650] mount_fs+0x92/0x2a0 [ 465.011999] vfs_kern_mount.part.0+0x5b/0x3c0 [ 465.016489] vfs_kern_mount+0x3c/0x60 [ 465.020277] btrfs_mount+0x2a0/0x2838 [ 465.024058] ? pcpu_find_block_fit+0x2ed/0x380 [ 465.028622] ? pcpu_alloc+0x37d/0xf70 [ 465.032398] ? btrfs_remount+0x10c0/0x10c0 [ 465.036607] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.042030] ? rcu_read_lock_sched_held+0x10a/0x130 [ 465.047018] ? pcpu_alloc+0xe1/0xf70 [ 465.050721] ? pcpu_find_block_fit+0x380/0x380 [ 465.055295] ? __lockdep_init_map+0x100/0x560 [ 465.059772] ? __lockdep_init_map+0x100/0x560 [ 465.064246] mount_fs+0x92/0x2a0 [ 465.067616] vfs_kern_mount.part.0+0x5b/0x3c0 [ 465.072100] do_mount+0x3c9/0x25e0 [ 465.075624] ? copy_mount_string+0x40/0x40 [ 465.079842] ? copy_mount_options+0x140/0x2e0 [ 465.084313] ? __sanitizer_cov_trace_pc+0x4a/0x50 [ 465.089139] ? copy_mount_options+0x1ec/0x2e0 [ 465.093617] ? copy_mnt_ns+0x8a0/0x8a0 [ 465.097480] SyS_mount+0xa8/0x120 [ 465.100905] ? copy_mnt_ns+0x8a0/0x8a0 [ 465.104766] do_syscall_64+0x1d5/0x640 [ 465.108657] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 465.113839] RIP: 0033:0x45f57a [ 465.117010] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 465.124689] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a 06:03:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x24000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$KDSETMODE(r0, 0x4b3a, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000440)="afc2a539842fc0a265a2ac7c718189f8d124ebb6d356d36c02272ad7f0bde5db34596f7c711d9fdafef87d54a89d9f0703344be7ff074516f6eea9a413eacebdb5b4fc8ab752e99cc87a80fa2223513352b962fb272c0679d751ee04219bd58d0fdbd41f5738ddc47eaf0d0566e1ad558ca02c5d1a6b2eca8b54dc34d05782ff040e05862dc471c8f52cfa8164f9889c6d2463403cbf13cd1c62f2021796990d6dccb6ea7b40474298763569e92b23ed7a14d9cba15d5e4fa7a189f7f191aa7d5d7264aa8faa57ead58a3a0e8570", 0x46}, {0x0}, {&(0x7f0000000200)="145d51e7b9d87df104469dfc7deb88566100498854a300000000000020000000000008", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f5fc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0xe}, 0x48115) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 465.131930] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 465.139175] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 465.146448] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 465.153689] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a5bba5d2e39bbf29137830eb2c9212a5a538c020362b53e5ee81827aecf4cbe082b4133d7562630013d675e7096c9415d88c05a553e7aab486924bf549565e04cd75e7e2de56a31b0e0f16400b9790eb09de880edc73011944061c968c7503ae9", 0x61) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:01 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, 0xffffffffffffffff, 0x0) [ 465.216755] print_req_error: I/O error, dev loop4, sector 128 [ 465.228796] BTRFS error (device loop5): superblock checksum mismatch 06:03:02 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 465.277169] BTRFS error (device loop5): open_ctree failed 06:03:02 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(0xffffffffffffffff, r2, 0x0) [ 465.348360] FAULT_INJECTION: forcing a failure. [ 465.348360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 465.360251] CPU: 1 PID: 10313 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 465.368119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.377477] Call Trace: [ 465.380062] dump_stack+0x1b2/0x283 [ 465.383678] should_fail.cold+0x10a/0x154 [ 465.387828] __alloc_pages_nodemask+0x22b/0x2730 [ 465.392666] ? depot_save_stack+0x10d/0x401 [ 465.396986] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 465.401475] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 465.405958] ? kmem_cache_alloc_trace+0x14d/0x3f0 [ 465.410791] ? btrfs_mount+0xf1e/0x2838 [ 465.414748] ? mount_fs+0x92/0x2a0 [ 465.418260] ? vfs_kern_mount.part.0+0x5b/0x3c0 [ 465.422900] ? vfs_kern_mount+0x3c/0x60 [ 465.426851] ? btrfs_mount+0x2a0/0x2838 [ 465.430813] ? mount_fs+0x92/0x2a0 [ 465.434328] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 465.439157] ? trace_hardirqs_on+0x10/0x10 [ 465.443488] ? cache_alloc_refill+0x310/0x360 [ 465.447956] ? do_raw_spin_unlock+0x164/0x250 [ 465.452440] cache_grow_begin+0x91/0x410 [ 465.456487] cache_alloc_refill+0x28c/0x360 [ 465.460796] kmem_cache_alloc_trace+0x35b/0x3f0 [ 465.465461] btrfs_mount+0xf7d/0x2838 [ 465.469238] ? pcpu_find_block_fit+0x2ed/0x380 [ 465.473795] ? pcpu_alloc+0x37d/0xf70 [ 465.477572] ? btrfs_remount+0x10c0/0x10c0 [ 465.481783] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.487204] ? rcu_read_lock_sched_held+0x10a/0x130 [ 465.492199] ? pcpu_alloc+0xe1/0xf70 [ 465.495891] ? __lockdep_init_map+0x100/0x560 [ 465.500360] ? __lockdep_init_map+0x100/0x560 [ 465.504827] mount_fs+0x92/0x2a0 [ 465.508175] vfs_kern_mount.part.0+0x5b/0x3c0 [ 465.512660] vfs_kern_mount+0x3c/0x60 [ 465.516477] btrfs_mount+0x2a0/0x2838 [ 465.520255] ? _find_next_bit+0xdb/0x100 [ 465.524384] ? pcpu_alloc+0x37d/0xf70 [ 465.528176] ? btrfs_remount+0x10c0/0x10c0 [ 465.532386] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.537819] ? rcu_read_lock_sched_held+0x10a/0x130 [ 465.542806] ? pcpu_alloc+0xe1/0xf70 [ 465.546506] ? pcpu_find_block_fit+0x380/0x380 [ 465.551060] ? __lockdep_init_map+0x100/0x560 [ 465.555527] ? __lockdep_init_map+0x100/0x560 [ 465.560007] mount_fs+0x92/0x2a0 [ 465.563349] vfs_kern_mount.part.0+0x5b/0x3c0 [ 465.567823] do_mount+0x3c9/0x25e0 [ 465.571341] ? copy_mount_string+0x40/0x40 [ 465.575550] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 465.580366] ? copy_mnt_ns+0x8a0/0x8a0 [ 465.584246] ? copy_mount_options+0x1ec/0x2e0 [ 465.588719] ? copy_mnt_ns+0x8a0/0x8a0 [ 465.592580] SyS_mount+0xa8/0x120 [ 465.596005] ? copy_mnt_ns+0x8a0/0x8a0 [ 465.599874] do_syscall_64+0x1d5/0x640 [ 465.603738] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 465.608899] RIP: 0033:0x45f57a [ 465.612064] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 465.619741] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 465.626988] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 465.634236] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 465.641481] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 06:03:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) 06:03:02 executing program 0: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000080)={0x4, 0x6}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:03:02 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) read$char_usb(r1, &(0x7f0000000080)=""/255, 0xff) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 465.648730] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 465.665562] IPVS: set_ctl: invalid protocol: 59 172.20.20.187:20001 [ 465.674415] BTRFS error (device loop5): superblock checksum mismatch 06:03:02 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(0xffffffffffffffff, r2, 0x0) 06:03:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0xe37, 0xffffff01, 0x0, &(0x7f0000000200)}) 06:03:02 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}}, 0xc080) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x802010, 0x0) 06:03:02 executing program 5 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 465.777228] BTRFS error (device loop5): open_ctree failed 06:03:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0xffffffff}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000480)="b5a433a059584d4ebdd3325c19a11aaeb4c8bdb26c9bc03a969cb3dfe6d67af14364b178e8aa912b4a2279ecbe33000000000a6e42c85eb1f5b48c2bcacae4b8fd2fe925ecdf6289446e7ecf000200000000000013cbefe7d1b1cd6655ff7b5c3a48cd5e786e94d323ba45b42d0e2612d2295fa7d58eaf9274e13a2158954a23ce4e0a408c2500b2df67942e139cc8", 0x8f}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r0, r1, 0x0, 0xff7ffffe) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000200)) 06:03:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x52, 0x10000}], 0x0, 0x0) [ 465.886535] FAULT_INJECTION: forcing a failure. [ 465.886535] name failslab, interval 1, probability 0, space 0, times 0 [ 465.902533] CPU: 1 PID: 10368 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 465.910406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.919734] Call Trace: [ 465.922302] dump_stack+0x1b2/0x283 [ 465.925907] should_fail.cold+0x10a/0x154 [ 465.930030] should_failslab+0xd6/0x130 [ 465.933974] kmem_cache_alloc+0x28e/0x3c0 [ 465.938098] alloc_buffer_head+0x20/0xd0 [ 465.942132] alloc_page_buffers+0xb3/0x1f0 [ 465.946340] __getblk_gfp+0x32c/0x7b0 [ 465.950117] ? __mutex_unlock_slowpath+0x75/0x780 [ 465.954932] __bread_gfp+0x29/0x1f0 [ 465.958533] btrfs_read_dev_one_super+0x98/0x260 [ 465.963265] btrfs_read_dev_super+0x5a/0xa0 [ 465.967562] ? btrfs_read_dev_one_super+0x260/0x260 [ 465.972551] btrfs_get_bdev_and_sb+0xd7/0x2d0 [ 465.977022] __btrfs_open_devices+0x175/0xa40 [ 465.981499] ? find_device+0x100/0x100 [ 465.985475] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 465.990989] btrfs_open_devices+0x98/0xb0 [ 465.995219] btrfs_mount+0x10a2/0x2838 [ 465.999090] ? pcpu_find_block_fit+0x2ed/0x380 [ 466.003647] ? pcpu_alloc+0x37d/0xf70 [ 466.007432] ? btrfs_remount+0x10c0/0x10c0 [ 466.011640] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 466.017095] ? rcu_read_lock_sched_held+0x10a/0x130 [ 466.022083] ? pcpu_alloc+0xe1/0xf70 [ 466.025773] ? __lockdep_init_map+0x100/0x560 [ 466.030334] ? __lockdep_init_map+0x100/0x560 [ 466.034802] mount_fs+0x92/0x2a0 [ 466.038149] vfs_kern_mount.part.0+0x5b/0x3c0 [ 466.042632] vfs_kern_mount+0x3c/0x60 [ 466.046408] btrfs_mount+0x2a0/0x2838 [ 466.050192] ? pcpu_find_block_fit+0x2ed/0x380 [ 466.054754] ? pcpu_alloc+0x37d/0xf70 [ 466.058530] ? btrfs_remount+0x10c0/0x10c0 [ 466.062745] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 466.068170] ? rcu_read_lock_sched_held+0x10a/0x130 [ 466.073162] ? pcpu_alloc+0xe1/0xf70 [ 466.076870] ? pcpu_find_block_fit+0x380/0x380 [ 466.081433] ? __lockdep_init_map+0x100/0x560 [ 466.085905] ? __lockdep_init_map+0x100/0x560 [ 466.090817] mount_fs+0x92/0x2a0 [ 466.094161] vfs_kern_mount.part.0+0x5b/0x3c0 [ 466.098634] do_mount+0x3c9/0x25e0 [ 466.102153] ? copy_mount_string+0x40/0x40 [ 466.106367] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 466.111185] ? copy_mnt_ns+0x8a0/0x8a0 [ 466.115048] ? copy_mount_options+0x1ec/0x2e0 [ 466.119524] ? copy_mnt_ns+0x8a0/0x8a0 [ 466.123387] SyS_mount+0xa8/0x120 [ 466.126816] ? copy_mnt_ns+0x8a0/0x8a0 [ 466.130681] do_syscall_64+0x1d5/0x640 06:03:02 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(0xffffffffffffffff, r2, 0x0) [ 466.134552] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 466.139713] RIP: 0033:0x45f57a [ 466.142875] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 466.150556] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 466.157797] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 466.165042] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 466.172288] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 466.179531] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x83a, &(0x7f0000000000), &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x81ff99983f9c18cd}, 0x48) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x2, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d1d, &(0x7f0000000240)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 466.253894] BTRFS error (device loop5): superblock checksum mismatch [ 466.327498] BTRFS error (device loop5): open_ctree failed [ 466.328583] print_req_error: I/O error, dev loop2, sector 0 06:03:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) unshare(0x8000900) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) 06:03:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x103) ftruncate(r2, 0x80006) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000080)={0x6, 0x2, 'client0\x00', 0xffffffff80000000, "904725bbeadb595c", "2ecd361a931688909cecc2b6ac12ab926e103e75bd62e8bbc2d41d3d47963f52", 0x5, 0x8000}) 06:03:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000080)) 06:03:03 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, r3, 0x0) 06:03:03 executing program 5 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 466.593571] FAULT_INJECTION: forcing a failure. [ 466.593571] name failslab, interval 1, probability 0, space 0, times 0 [ 466.633022] CPU: 1 PID: 10399 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 466.640929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.650279] Call Trace: [ 466.652867] dump_stack+0x1b2/0x283 [ 466.656497] should_fail.cold+0x10a/0x154 [ 466.660649] should_failslab+0xd6/0x130 [ 466.664624] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 466.669296] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 466.676131] sget_userns+0x102/0xc30 [ 466.679840] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 466.686676] ? btrfs_parse_early_options+0x310/0x310 [ 466.691779] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 466.698617] ? btrfs_parse_early_options+0x310/0x310 [ 466.703717] sget+0xd1/0x110 [ 466.706741] btrfs_mount+0x113c/0x2838 [ 466.710628] ? pcpu_find_block_fit+0x2ed/0x380 [ 466.715211] ? pcpu_alloc+0x37d/0xf70 [ 466.719022] ? btrfs_remount+0x10c0/0x10c0 [ 466.723261] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 466.728714] ? rcu_read_lock_sched_held+0x10a/0x130 [ 466.733732] ? pcpu_alloc+0xe1/0xf70 [ 466.737481] ? __lockdep_init_map+0x100/0x560 [ 466.741973] ? __lockdep_init_map+0x100/0x560 [ 466.746474] mount_fs+0x92/0x2a0 [ 466.749841] vfs_kern_mount.part.0+0x5b/0x3c0 [ 466.754337] vfs_kern_mount+0x3c/0x60 [ 466.758138] btrfs_mount+0x2a0/0x2838 [ 466.761939] ? _find_next_bit+0xdb/0x100 [ 466.765995] ? pcpu_alloc+0x37d/0xf70 [ 466.769902] ? btrfs_remount+0x10c0/0x10c0 [ 466.774141] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 466.779588] ? rcu_read_lock_sched_held+0x10a/0x130 [ 466.784600] ? pcpu_alloc+0xe1/0xf70 [ 466.788320] ? pcpu_find_block_fit+0x380/0x380 [ 466.792896] ? __lockdep_init_map+0x100/0x560 [ 466.797391] ? __lockdep_init_map+0x100/0x560 [ 466.801887] mount_fs+0x92/0x2a0 [ 466.805251] vfs_kern_mount.part.0+0x5b/0x3c0 [ 466.809746] do_mount+0x3c9/0x25e0 [ 466.813284] ? copy_mount_string+0x40/0x40 [ 466.817514] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 466.822359] ? copy_mnt_ns+0x8a0/0x8a0 [ 466.826241] ? copy_mount_options+0x1ec/0x2e0 [ 466.830730] ? copy_mnt_ns+0x8a0/0x8a0 [ 466.834615] SyS_mount+0xa8/0x120 [ 466.838062] ? copy_mnt_ns+0x8a0/0x8a0 [ 466.841957] do_syscall_64+0x1d5/0x640 [ 466.845845] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 466.851025] RIP: 0033:0x45f57a [ 466.854211] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 466.861911] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 466.869175] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 466.876451] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 466.883709] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 466.890970] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) ftruncate(r0, 0x80006) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) 06:03:03 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, r3, 0x0) 06:03:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x8) finit_module(r2, &(0x7f0000000180)='bbr\x00', 0x1) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000080)={0x40, 0xa8f, 0x20}) 06:03:03 executing program 5 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:03 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x402402, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev, 0xc}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x7fffffff}, 0x8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 467.151993] print_req_error: I/O error, dev loop2, sector 0 [ 467.173899] print_req_error: I/O error, dev loop5, sector 0 [ 467.182570] FAULT_INJECTION: forcing a failure. [ 467.182570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 467.194378] CPU: 0 PID: 10448 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 467.202263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.211607] Call Trace: [ 467.214211] dump_stack+0x1b2/0x283 [ 467.217843] should_fail.cold+0x10a/0x154 [ 467.222113] __alloc_pages_nodemask+0x22b/0x2730 [ 467.226873] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 467.231886] ? _raw_spin_unlock_irq+0x5a/0x90 [ 467.236376] ? finish_task_switch+0x178/0x610 [ 467.240862] ? finish_task_switch+0x14d/0x610 [ 467.245377] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 467.250216] ? trace_hardirqs_on+0x10/0x10 [ 467.254454] ? firmware_map_remove+0x18f/0x18f [ 467.259026] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 467.264115] ? prepare_to_wait+0x114/0x2a0 [ 467.268339] ? schedule+0x97/0x1b0 [ 467.271873] cache_grow_begin+0x91/0x410 [ 467.275933] cache_alloc_refill+0x28c/0x360 [ 467.280259] kmem_cache_alloc+0x333/0x3c0 [ 467.284407] getname_kernel+0x4e/0x340 [ 467.288291] kern_path+0x1b/0x40 [ 467.291644] lookup_bdev.part.0+0x60/0x160 [ 467.295860] ? blkdev_open+0x250/0x250 [ 467.299739] ? btrfs_read_dev_super+0x74/0xa0 [ 467.304234] blkdev_get_by_path+0x70/0xf0 [ 467.308382] btrfs_get_bdev_and_sb+0x33/0x2d0 [ 467.312870] ? fs_reclaim_acquire+0x10/0x10 [ 467.317188] __btrfs_open_devices+0x175/0xa40 [ 467.321672] ? find_device+0x100/0x100 [ 467.325542] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 467.330968] btrfs_open_devices+0x98/0xb0 [ 467.335102] btrfs_mount+0x10a2/0x2838 [ 467.338990] ? pcpu_find_block_fit+0x2ed/0x380 [ 467.343569] ? pcpu_alloc+0x37d/0xf70 [ 467.347354] ? btrfs_remount+0x10c0/0x10c0 [ 467.351576] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 467.357007] ? rcu_read_lock_sched_held+0x10a/0x130 [ 467.362002] ? pcpu_alloc+0xe1/0xf70 [ 467.365698] ? __lockdep_init_map+0x100/0x560 [ 467.370174] ? __lockdep_init_map+0x100/0x560 [ 467.374651] mount_fs+0x92/0x2a0 [ 467.377996] vfs_kern_mount.part.0+0x5b/0x3c0 [ 467.382473] vfs_kern_mount+0x3c/0x60 [ 467.386252] btrfs_mount+0x2a0/0x2838 [ 467.390043] ? _find_next_bit+0xdb/0x100 [ 467.394214] ? pcpu_alloc+0x37d/0xf70 [ 467.398004] ? btrfs_remount+0x10c0/0x10c0 [ 467.402243] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 467.407682] ? rcu_read_lock_sched_held+0x10a/0x130 [ 467.412677] ? pcpu_alloc+0xe1/0xf70 [ 467.416376] ? pcpu_find_block_fit+0x380/0x380 [ 467.420933] ? __lockdep_init_map+0x100/0x560 [ 467.425404] ? __lockdep_init_map+0x100/0x560 [ 467.429890] mount_fs+0x92/0x2a0 [ 467.433251] vfs_kern_mount.part.0+0x5b/0x3c0 [ 467.437725] do_mount+0x3c9/0x25e0 [ 467.441242] ? copy_mount_string+0x40/0x40 [ 467.445451] ? copy_mount_options+0x17d/0x2e0 [ 467.449919] ? copy_mount_options+0x183/0x2e0 [ 467.454387] ? copy_mount_options+0x1ec/0x2e0 [ 467.458855] ? copy_mnt_ns+0x8a0/0x8a0 [ 467.462715] SyS_mount+0xa8/0x120 [ 467.466139] ? copy_mnt_ns+0x8a0/0x8a0 [ 467.470001] do_syscall_64+0x1d5/0x640 [ 467.473865] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 467.479026] RIP: 0033:0x45f57a [ 467.482189] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 467.489884] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a 06:03:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$key(0xf, 0x3, 0x2) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) [ 467.497134] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 467.504386] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 467.511627] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 467.518869] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:04 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, r3, 0x0) [ 467.646514] BTRFS error (device loop5): superblock checksum mismatch 06:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r1, r2, 0x0, 0xff7ffffe) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r3, r4, 0x0, 0xff7ffffe) ioctl$vim2m_VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000080)={0x4, 0x1, 0x4, 0x1, 0x69f, {}, {0x2, 0x1, 0x7f, 0x2, 0x1, 0x1, "6a3bd433"}, 0x10000, 0x4, @userptr=0xfffffffffffffffd, 0x4, 0x0, r4}) r6 = fcntl$dupfd(r0, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="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", 0x136, 0x10000}], 0x0, 0x0) [ 467.709631] BTRFS error (device loop5): open_ctree failed 06:03:04 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, r3, 0x0) 06:03:04 executing program 5 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 06:03:04 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) finit_module(r0, &(0x7f0000000180)='bbr\x00', 0x1) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r1, 0x18, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x5859363e02bb9c6e}, 0x1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r1, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1ff}]}, 0x28}, 0x1, 0x0, 0x0, 0x20008085}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x182a3, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0xc, &(0x7f0000001780)=[{&(0x7f00000000c0)="59ca8b7ab3f18451231dc7897a743ec28c6fb1b616f8d4fd8c1a6ed6b5cff86f537e6c9118677ff41f598b059e4d45c9dfc25e4598471d26401594b7c45f13a74cf7705e7e5dc1c12d0c76c69eef82a33eba5a6bfb53361091757530db6d50a20d7f4736f5f7d6369d3de84c682d764a2eac4d430553a37721b3ba44b1ca0e3b65c3bb4afadcf4fca3299b84d8da21563495e3200beebda2cda8906bdd31b27f6cf343dc92578994e848e0c273228131ed6a0b06f929c9f91a2f3d12cadab25e5cd76e11d4a9eb085a61bf3700e5b4c0a865497e1aef6ca8c22d33a7c2d052", 0xdf}, {&(0x7f0000000200)}, {&(0x7f0000000340)="de71", 0x2}, {&(0x7f0000000380)}, {&(0x7f0000000400)="afc2a539842fc0a265a2ac7e718189f8d124ebb6d356d36cce272ad7f0bde5db34596f7c713b0b761796d19951301d9fda2c2b7d54a89d9f0703344be7f1074516f6eea9a413", 0x46}, {0x0}, {&(0x7f0000000580)="145d51469dfc7deb8856aa82af690f87bc892d80befe2161f7498854a3", 0x1d}, {&(0x7f0000000600)="cc69e6fb766eb8716f487e448c28af25bc2b2bffb1b14ca30e3d2b6e4dc393f076ab24a5686223050add", 0x2a}, {&(0x7f0000000680)}, {&(0x7f0000001680)="200218031f4cc7598a51374a7ada7300c2e913ae28681cc4325a92ac2f577dc49f06cba699fc0ab1d0cdb40aba8d43e50e7b55ebedc0cfa4e1519741144f90b02cbf9335f6ed95", 0x47}], 0xa, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x30}, 0x20000000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 467.849789] FAULT_INJECTION: forcing a failure. [ 467.849789] name failslab, interval 1, probability 0, space 0, times 0 [ 467.873828] CPU: 1 PID: 10505 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 467.881728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.891077] Call Trace: [ 467.893664] dump_stack+0x1b2/0x283 [ 467.897298] should_fail.cold+0x10a/0x154 [ 467.901454] should_failslab+0xd6/0x130 [ 467.905434] __kmalloc+0x2c1/0x400 [ 467.908971] ? register_shrinker+0x1ab/0x220 [ 467.913377] register_shrinker+0x1ab/0x220 [ 467.917608] sget_userns+0x9c5/0xc30 [ 467.921326] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 467.928168] ? btrfs_parse_early_options+0x310/0x310 [ 467.933271] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 467.940106] ? btrfs_parse_early_options+0x310/0x310 [ 467.945209] sget+0xd1/0x110 [ 467.948227] btrfs_mount+0x113c/0x2838 [ 467.952115] ? pcpu_find_block_fit+0x2ed/0x380 [ 467.956691] ? pcpu_alloc+0x37d/0xf70 [ 467.960494] ? btrfs_remount+0x10c0/0x10c0 [ 467.964731] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 467.970182] ? rcu_read_lock_sched_held+0x10a/0x130 [ 467.975196] ? pcpu_alloc+0xe1/0xf70 [ 467.978916] ? __lockdep_init_map+0x100/0x560 [ 467.983415] ? __lockdep_init_map+0x100/0x560 [ 467.987910] mount_fs+0x92/0x2a0 [ 467.991279] vfs_kern_mount.part.0+0x5b/0x3c0 [ 467.995772] vfs_kern_mount+0x3c/0x60 [ 467.999570] btrfs_mount+0x2a0/0x2838 [ 468.003370] ? _find_next_bit+0xdb/0x100 [ 468.007432] ? pcpu_alloc+0x37d/0xf70 [ 468.011233] ? btrfs_remount+0x10c0/0x10c0 [ 468.015475] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 468.020914] ? rcu_read_lock_sched_held+0x10a/0x130 [ 468.025909] ? pcpu_alloc+0xe1/0xf70 [ 468.029606] ? pcpu_find_block_fit+0x380/0x380 [ 468.034165] ? __lockdep_init_map+0x100/0x560 [ 468.038635] ? __lockdep_init_map+0x100/0x560 [ 468.043157] mount_fs+0x92/0x2a0 [ 468.046502] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.050980] do_mount+0x3c9/0x25e0 [ 468.054505] ? copy_mount_string+0x40/0x40 [ 468.058717] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 468.063542] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.067567] ? copy_mount_options+0x1ec/0x2e0 [ 468.072048] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.075910] SyS_mount+0xa8/0x120 [ 468.079339] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.083204] do_syscall_64+0x1d5/0x640 [ 468.087080] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 468.092252] RIP: 0033:0x45f57a 06:03:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x14000, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x5c}}, {@mode={'mode', 0x3d, 0xffffffff80000000}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x99e9}}, {@mode={'mode', 0x3d, 0xd4cf}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0xa5}}], [{@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r1}}, {@audit='audit'}, {@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@subj_type={'subj_type', 0x3d, '.[+'}}, {@fsname={'fsname', 0x3d, '@-\\'}}]}) [ 468.095419] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 468.103106] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 468.110355] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 468.117609] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 468.124855] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 468.132098] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 06:03:04 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780), 0x0, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7c}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x5f, [@remote, @multicast2]}, @cipso={0x86, 0x14, 0x0, [{0x6, 0xe, "6cf92a8ca3d5faedc0e05cde"}]}, @end, @ra={0x94, 0x4}, @timestamp={0x44, 0xc, 0xb0, 0x0, 0x3, [0x7, 0x60000000]}, @lsrr={0x83, 0x1f, 0x51, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @loopback, @multicast1, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}]}, @lsrr={0x83, 0x23, 0xfe, [@local, @multicast1, @rand_addr=0x64010102, @empty, @multicast2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101]}]}}}], 0xa0}, 0x20004000) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100) socket(0x11, 0x800000003, 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f00000001c0)=0x80) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) dup3(r2, r3, 0x0) [ 468.178962] print_req_error: I/O error, dev loop2, sector 0 [ 468.199204] ================================================================== [ 468.206853] BUG: KASAN: use-after-free in btrfs_mount+0x2412/0x2838 [ 468.213255] Read of size 8 at addr ffff88805aa2b758 by task syz-executor.5/10505 [ 468.220774] [ 468.222385] CPU: 1 PID: 10505 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 468.230246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.239577] Call Trace: [ 468.242161] dump_stack+0x1b2/0x283 [ 468.245769] ? btrfs_mount+0x2412/0x2838 [ 468.249808] print_address_description.cold+0x54/0x1dc [ 468.255059] ? btrfs_mount+0x2412/0x2838 [ 468.259096] kasan_report.cold+0xa9/0x2b9 [ 468.263222] btrfs_mount+0x2412/0x2838 [ 468.267091] ? pcpu_find_block_fit+0x2ed/0x380 [ 468.271762] ? pcpu_alloc+0x37d/0xf70 [ 468.275546] ? btrfs_remount+0x10c0/0x10c0 [ 468.279764] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 468.285191] ? rcu_read_lock_sched_held+0x10a/0x130 [ 468.290183] ? pcpu_alloc+0xe1/0xf70 [ 468.293881] ? __lockdep_init_map+0x100/0x560 [ 468.298353] ? __lockdep_init_map+0x100/0x560 [ 468.302826] mount_fs+0x92/0x2a0 [ 468.306171] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.310647] vfs_kern_mount+0x3c/0x60 [ 468.314425] btrfs_mount+0x2a0/0x2838 [ 468.318207] ? _find_next_bit+0xdb/0x100 [ 468.322244] ? pcpu_alloc+0x37d/0xf70 [ 468.326022] ? btrfs_remount+0x10c0/0x10c0 [ 468.330238] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 468.335664] ? rcu_read_lock_sched_held+0x10a/0x130 [ 468.340654] ? pcpu_alloc+0xe1/0xf70 [ 468.344348] ? pcpu_find_block_fit+0x380/0x380 [ 468.348906] ? __lockdep_init_map+0x100/0x560 [ 468.353378] ? __lockdep_init_map+0x100/0x560 [ 468.357855] mount_fs+0x92/0x2a0 [ 468.361208] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.365689] do_mount+0x3c9/0x25e0 [ 468.369216] ? copy_mount_string+0x40/0x40 [ 468.373430] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 468.378249] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.382111] ? copy_mount_options+0x1ec/0x2e0 [ 468.386591] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.390473] SyS_mount+0xa8/0x120 [ 468.393909] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.397775] do_syscall_64+0x1d5/0x640 [ 468.401646] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 468.406810] RIP: 0033:0x45f57a [ 468.409976] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 468.417660] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 468.424906] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 468.432154] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 468.439402] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 468.446649] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 468.453913] [ 468.455584] Allocated by task 10505: [ 468.459285] kasan_kmalloc.part.0+0x4f/0xd0 [ 468.463583] __kmalloc_node+0x4c/0x70 [ 468.467361] kvmalloc_node+0x88/0xd0 [ 468.471049] btrfs_mount+0xea4/0x2838 [ 468.474825] mount_fs+0x92/0x2a0 [ 468.478167] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.482638] vfs_kern_mount+0x3c/0x60 [ 468.486419] btrfs_mount+0x2a0/0x2838 [ 468.490197] mount_fs+0x92/0x2a0 [ 468.493540] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.498011] do_mount+0x3c9/0x25e0 [ 468.501526] SyS_mount+0xa8/0x120 [ 468.504961] do_syscall_64+0x1d5/0x640 [ 468.508828] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 468.513988] [ 468.515589] Freed by task 10505: [ 468.518929] kasan_slab_free+0xaf/0x190 [ 468.522873] kfree+0xcb/0x260 [ 468.525951] kvfree+0x45/0x50 [ 468.529029] deactivate_locked_super+0x6c/0xd0 [ 468.533589] sget_userns+0x9df/0xc30 [ 468.537274] sget+0xd1/0x110 [ 468.540264] btrfs_mount+0x113c/0x2838 [ 468.544145] mount_fs+0x92/0x2a0 [ 468.547496] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.551991] vfs_kern_mount+0x3c/0x60 [ 468.555773] btrfs_mount+0x2a0/0x2838 [ 468.559545] mount_fs+0x92/0x2a0 [ 468.562885] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.567351] do_mount+0x3c9/0x25e0 [ 468.570862] SyS_mount+0xa8/0x120 [ 468.574289] do_syscall_64+0x1d5/0x640 [ 468.578150] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 468.583309] [ 468.584910] The buggy address belongs to the object at ffff88805aa29ec0 [ 468.584910] which belongs to the cache kmalloc-16384 of size 16384 [ 468.597893] The buggy address is located 6296 bytes inside of [ 468.597893] 16384-byte region [ffff88805aa29ec0, ffff88805aa2dec0) [ 468.610000] The buggy address belongs to the page: [ 468.614900] page:ffffea00016a8a00 count:1 mapcount:0 mapping:ffff88805aa29ec0 index:0x0 compound_mapcount: 0 [ 468.624840] flags: 0xfffe0000008100(slab|head) [ 468.629399] raw: 00fffe0000008100 ffff88805aa29ec0 0000000000000000 0000000100000001 [ 468.637257] raw: ffffea00022daa20 ffff8880aa801c48 ffff8880aa802200 0000000000000000 [ 468.645110] page dumped because: kasan: bad access detected [ 468.650791] [ 468.652389] Memory state around the buggy address: [ 468.657292] ffff88805aa2b600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 468.664734] ffff88805aa2b680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 468.672082] >ffff88805aa2b700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 06:03:05 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="0189efe6453b644f9ef3fc2ca00d886b816b7793b4dc05b330009072bb10378cad97fbeb26bc07963792dd3997da0c564447e2e22bf555010862fef41639aa82ae58b4d6c099cd1eff1d19188a9fe174c2ad3cf9dc8a480ec175a6e750d4847488e4bbcc5a11096bf21ac6e49ed46d36df0aab16d93f2d1910a46f33add1d8b4ff9a986d541c09", 0x87, 0x4}, {&(0x7f0000000100)="5d0d03b5e1e3c50ed5d3b3f7ea14918c85080ce4f93dccfce5ee2ec574f88b76a31ba80bb351a66db34c52dc24c3def354ff512212a87103342e9ae6e274d293cca6ca1a0bffb942a8f5fef7af58862a7c237290ed903ce6f2ce9c8cd2e07781", 0x60, 0x1}, {&(0x7f0000000180)="d18fe81ebd17032729818adf6ac6e06b533f89c74b3252c8f25a", 0x1a, 0x4}], 0x0, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ocfs2_control\x00', 0x100, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000600)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a00000020036758e6180004800400078008000200000000000800040000000000bd5f7ec2afc23027d8b121b94734fa7c826c02769161afd60fc8fb7c8b9ad71cde09ed7544f0a928bc1282b6627c02f1d451692491da2671705e83d90c2eec2457e1d69714f883198ca420ad48d889721d046341b60178841272ed4ee3116b792e"], 0x2c}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x16c, r2, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffffff59}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf6a}]}, @TIPC_NLA_NODE={0x98, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "6c7ff176c3eb502e851282f6bf5f6ddc4a200a5f77fb509112a166a568cf"}}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "e5d44dbe86012f630c6e974a62a40b0423a28de268"}}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20000000}, 0x60000001) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) sendfile(r3, r4, 0x0, 0xff7ffffe) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x3, 0x8, "b6417c77c3f9130585b20392edf0e920b16f143296321e72a2f14b1b44b3569268574b1dc89d9e5fcf6e8eb75df27739c1ff37995f304f592cdc5055dfad2509", "2524576b433c9c3e356a3408e0e644b8a92ea6a5fa287f0511244c4d014ed376a7e07a331c033704d778dcdd4a765abbcc5c35a2d1c70976f3ef4fd3a7dd2eb7", "03e466c79ae013e998cb6dafe6899b70d40e955f1abf458f2c0038bb6fabf4fa", [0x7, 0x5]}) 06:03:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x241, 0x0) [ 468.679412] ^ [ 468.685619] ffff88805aa2b780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 468.692965] ffff88805aa2b800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 468.700295] ================================================================== [ 468.707623] Disabling lock debugging due to kernel taint [ 468.733138] Kernel panic - not syncing: panic_on_warn set ... [ 468.733138] [ 468.740528] CPU: 1 PID: 10505 Comm: syz-executor.5 Tainted: G B 4.14.184-syzkaller #0 [ 468.749610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.758945] Call Trace: [ 468.761534] dump_stack+0x1b2/0x283 [ 468.765155] panic+0x1f9/0x42d [ 468.768341] ? add_taint.cold+0x16/0x16 [ 468.772307] ? preempt_schedule_common+0x4a/0xc0 [ 468.777055] ? btrfs_mount+0x2412/0x2838 06:03:05 executing program 3: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x808000, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x763}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x7fff}}, {@mode={'mode', 0x3d, 0x1}}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_eq={'uid', 0x3d, r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'btrfs\x00'}}, {@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffff7}}, {@euid_lt={'euid<', r5}}]}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:03:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004dd4b002000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2004404d, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000180)='./bus\x00', 0x101942, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000200), 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x800000237f, 0x4) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0xb) sendfile(r0, r1, 0x0, 0xff7ffffe) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x10400, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000240)={0x0, 0x9, 0x8, &(0x7f0000000200)=0x9}) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000140)={0x1, r3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='btrfs\x00', r1}, 0x10) prctl$PR_GET_FP_MODE(0x2e) [ 468.781108] ? ___preempt_schedule+0x16/0x18 [ 468.785516] ? btrfs_mount+0x2412/0x2838 [ 468.789568] kasan_end_report+0x43/0x49 [ 468.793535] kasan_report.cold+0x12f/0x2b9 [ 468.797762] btrfs_mount+0x2412/0x2838 [ 468.801643] ? pcpu_find_block_fit+0x2ed/0x380 [ 468.806226] ? pcpu_alloc+0x37d/0xf70 [ 468.810020] ? btrfs_remount+0x10c0/0x10c0 [ 468.814251] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 468.819689] ? rcu_read_lock_sched_held+0x10a/0x130 [ 468.824692] ? pcpu_alloc+0xe1/0xf70 [ 468.828404] ? __lockdep_init_map+0x100/0x560 [ 468.832880] ? __lockdep_init_map+0x100/0x560 [ 468.837357] mount_fs+0x92/0x2a0 [ 468.840708] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.845184] vfs_kern_mount+0x3c/0x60 [ 468.848969] btrfs_mount+0x2a0/0x2838 [ 468.852750] ? _find_next_bit+0xdb/0x100 [ 468.856787] ? pcpu_alloc+0x37d/0xf70 [ 468.860568] ? btrfs_remount+0x10c0/0x10c0 [ 468.864787] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 468.870212] ? rcu_read_lock_sched_held+0x10a/0x130 [ 468.875205] ? pcpu_alloc+0xe1/0xf70 [ 468.878903] ? pcpu_find_block_fit+0x380/0x380 [ 468.883458] ? __lockdep_init_map+0x100/0x560 [ 468.887926] ? __lockdep_init_map+0x100/0x560 [ 468.892486] mount_fs+0x92/0x2a0 [ 468.895828] vfs_kern_mount.part.0+0x5b/0x3c0 [ 468.900299] do_mount+0x3c9/0x25e0 [ 468.903818] ? copy_mount_string+0x40/0x40 [ 468.908029] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 468.912845] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.916705] ? copy_mount_options+0x1ec/0x2e0 [ 468.921173] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.925047] SyS_mount+0xa8/0x120 [ 468.928479] ? copy_mnt_ns+0x8a0/0x8a0 [ 468.932342] do_syscall_64+0x1d5/0x640 [ 468.936209] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 468.941375] RIP: 0033:0x45f57a [ 468.944535] RSP: 002b:00007f77bb349a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 468.952227] RAX: ffffffffffffffda RBX: 000000000050a1c0 RCX: 000000000045f57a [ 468.959469] RDX: 00007f77bb349ae0 RSI: 00000000200001c0 RDI: 00007f77bb349b00 [ 468.966712] RBP: 000000000078bf00 R08: 00007f77bb349b40 R09: 00007f77bb349ae0 [ 468.973951] R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000003 [ 468.981193] R13: 0000000000000c2a R14: 00000000004ce758 R15: 00007f77bb34a6d4 [ 468.989696] Kernel Offset: disabled [ 468.993386] Rebooting in 86400 seconds..