05000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1351.363755] BTRFS error (device loop4): superblock checksum mismatch [ 1351.384502] BTRFS error (device loop4): open_ctree failed [ 1351.399061] BTRFS error (device loop4): superblock checksum mismatch 21:25:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1351.458573] BTRFS error (device loop4): open_ctree failed [ 1351.482991] BTRFS error (device loop4): superblock checksum mismatch 21:25:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100", 0xcb, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1351.529308] BTRFS error (device loop4): open_ctree failed [ 1351.559968] BTRFS error (device loop4): superblock checksum mismatch [ 1351.572965] BTRFS error (device loop4): open_ctree failed 21:25:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100", 0xcb, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1351.591739] BTRFS error (device loop4): superblock checksum mismatch 21:25:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e4", 0x2, 0x10000}], 0x0, &(0x7f00000005c0)) 21:25:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1351.741983] BTRFS error (device loop4): open_ctree failed [ 1351.814992] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop4 21:25:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1351.885675] BTRFS error (device loop4): superblock checksum mismatch [ 1351.909692] BTRFS error (device loop4): open_ctree failed 21:25:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e4", 0x2, 0x10000}], 0x0, &(0x7f00000005c0)) 21:25:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100", 0xcb, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1351.942097] BTRFS error (device loop4): superblock checksum mismatch [ 1351.986218] BTRFS error (device loop4): open_ctree failed 21:25:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1352.071272] BTRFS error (device loop4): superblock checksum mismatch 21:25:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e4", 0x2, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1352.117257] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (12339) 21:25:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1352.162740] BTRFS error (device loop4): open_ctree failed [ 1352.169837] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1352.182348] BTRFS error (device loop4): superblock checksum mismatch [ 1352.205684] BTRFS error (device loop4): open_ctree failed 21:25:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b04", 0x25, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1352.239045] BTRFS error (device loop4): superblock checksum mismatch 21:25:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1352.367614] BTRFS error (device loop4): open_ctree failed [ 1352.382286] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1352.430433] BTRFS error (device loop5): superblock checksum mismatch [ 1352.468157] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (12376) 21:25:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1352.522554] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1352.614859] BTRFS error (device loop5): open_ctree failed 21:25:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b04", 0x25, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1352.709452] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12401) [ 1352.722424] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1352.723662] BTRFS error (device loop4): superblock checksum mismatch [ 1352.741025] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (12411) 21:25:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000100000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1352.852165] BTRFS error (device loop4): open_ctree failed [ 1352.878528] BTRFS error (device loop4): superblock checksum mismatch 21:25:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010002791c0000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1352.896092] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12431) 21:25:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1352.942104] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1352.986177] BTRFS error (device loop4): open_ctree failed 21:25:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b04", 0x25, 0x10000}], 0x0, &(0x7f00000005c0)) 21:25:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1353.240172] BTRFS error (device loop1): superblock checksum mismatch [ 1353.246123] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12460) 21:25:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1353.284818] BTRFS error (device loop1): open_ctree failed [ 1353.299408] BTRFS info (device loop0): disk space caching is enabled [ 1353.317049] BTRFS info (device loop0): has skinny extents 21:25:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1353.394004] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1353.402170] BTRFS warning (device loop0): failed to read tree root 21:25:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff000000080003c600000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1353.440933] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12505) 21:25:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1353.495059] BTRFS error (device loop0): open_ctree failed [ 1353.504594] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1353.531996] BTRFS info (device loop0): disabling disk space caching 21:25:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1353.547307] BTRFS info (device loop0): has skinny extents 21:25:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1353.638290] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (12525) [ 1353.707482] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1353.716710] BTRFS warning (device loop0): failed to read tree root 21:25:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1353.750446] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12535) 21:25:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1353.878481] BTRFS error (device loop0): open_ctree failed 21:25:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000", 0xd1, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1353.978017] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (12577) [ 1353.989931] BTRFS info (device loop0): disk space caching is enabled [ 1353.996748] BTRFS info (device loop0): has skinny extents [ 1354.004177] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12585) 21:25:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000000002a7005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1354.052780] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000", 0xd1, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1354.107515] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1354.130869] BTRFS warning (device loop0): failed to read tree root 21:25:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc200000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1354.277321] BTRFS error (device loop0): open_ctree failed 21:25:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010002791f0000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1354.353722] BTRFS error (device loop3): superblock checksum mismatch 21:25:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1354.524309] BTRFS error (device loop3): open_ctree failed [ 1354.559362] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc200000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f00000005c0)) 21:25:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1354.581298] BTRFS info (device loop0): disk space caching is enabled [ 1354.621024] BTRFS info (device loop0): has skinny extents [ 1354.631729] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (12665) 21:25:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc200000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f00000005c0)) 21:25:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000", 0xcd, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1354.805630] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12696) 21:25:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1354.861092] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1354.873702] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1354.884094] BTRFS warning (device loop0): failed to read tree root 21:25:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff000000080000fc00000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1354.958669] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (12727) 21:25:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000279200000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1355.066903] BTRFS error (device loop0): open_ctree failed [ 1355.076645] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop4 21:25:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1355.133984] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (12742) [ 1355.163288] BTRFS error (device loop4): superblock checksum mismatch 21:25:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000000002b0005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1355.191854] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff000000080003fe00000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1355.264252] BTRFS error (device loop4): open_ctree failed 21:25:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000", 0xcd, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1355.351753] BTRFS error (device loop4): superblock checksum mismatch [ 1355.360594] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (12767) 21:25:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1355.486280] BTRFS error (device loop4): open_ctree failed [ 1355.494425] BTRFS error (device loop3): superblock checksum mismatch [ 1355.510248] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1355.632644] BTRFS error (device loop3): open_ctree failed [ 1355.670277] BTRFS error (device loop4): superblock checksum mismatch 21:25:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1355.677467] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1355.810428] BTRFS error (device loop4): open_ctree failed 21:25:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000", 0xcd, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800f4ff00000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1355.903874] BTRFS error (device loop4): superblock checksum mismatch 21:25:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1355.978775] BTRFS error (device loop4): open_ctree failed [ 1356.009603] BTRFS error (device loop3): superblock checksum mismatch 21:25:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1356.044995] BTRFS error (device loop3): open_ctree failed [ 1356.077200] BTRFS error (device loop3): superblock checksum mismatch 21:25:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1356.149672] BTRFS error (device loop3): open_ctree failed [ 1356.160775] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 21:25:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000", 0xce, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1356.239609] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (12855) [ 1356.256306] BTRFS error (device loop5): superblock checksum mismatch [ 1356.278147] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00000a0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1356.328527] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (12872) 21:25:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000230000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000002000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1356.408481] BTRFS error (device loop5): open_ctree failed 21:25:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000005c0)) 21:25:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1356.497946] BTRFS error (device loop5): superblock checksum mismatch 21:25:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00000008002bf102000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1356.538905] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (12897) 21:25:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00000b0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1356.583009] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1356.690808] BTRFS error (device loop5): open_ctree failed [ 1356.702152] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1356.729080] BTRFS error (device loop4): superblock checksum mismatch 21:25:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000", 0xce, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1356.748689] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (12924) 21:25:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1356.914911] BTRFS error (device loop4): open_ctree failed [ 1356.952306] BTRFS error (device loop5): superblock checksum mismatch 21:25:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000005c0)) [ 1356.966012] BTRFS error (device loop5): open_ctree failed [ 1356.973748] BTRFS error (device loop5): superblock checksum mismatch [ 1356.980670] BTRFS error (device loop5): open_ctree failed 21:25:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000", 0xce, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1357.027586] BTRFS error (device loop5): superblock checksum mismatch [ 1357.045610] BTRFS error (device loop5): open_ctree failed [ 1357.067494] BTRFS error (device loop5): superblock checksum mismatch [ 1357.074903] BTRFS error (device loop5): open_ctree failed [ 1357.082464] BTRFS error (device loop5): superblock checksum mismatch [ 1357.096082] BTRFS error (device loop5): open_ctree failed 21:25:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000005c0)) 21:25:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00000d0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1357.332639] BTRFS error (device loop5): superblock checksum mismatch [ 1357.343290] BTRFS error (device loop5): open_ctree failed [ 1357.360128] BTRFS error (device loop5): superblock checksum mismatch 21:25:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000005c0)) [ 1357.382593] BTRFS error (device loop5): open_ctree failed [ 1357.416197] BTRFS error (device loop5): superblock checksum mismatch [ 1357.423858] BTRFS error (device loop5): open_ctree failed [ 1357.440028] BTRFS error (device loop5): superblock checksum mismatch [ 1357.449291] BTRFS error (device loop5): open_ctree failed [ 1357.459791] BTRFS error (device loop5): superblock checksum mismatch 21:25:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000000253b8005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00000e0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1357.493583] BTRFS error (device loop5): open_ctree failed 21:25:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000005c0)) [ 1357.653701] BTRFS error (device loop4): superblock checksum mismatch [ 1357.678002] BTRFS error (device loop4): open_ctree failed 21:25:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1357.701451] BTRFS error (device loop4): superblock checksum mismatch [ 1357.783397] BTRFS error (device loop4): open_ctree failed [ 1357.815170] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13064) 21:25:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1357.827657] BTRFS error (device loop5): superblock checksum mismatch 21:25:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000005c0)) 21:25:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1357.928764] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13079) 21:25:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff000000080031f102000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1357.973740] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000000253ba005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1358.013178] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1358.168259] BTRFS error (device loop5): open_ctree failed 21:25:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:25:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, 0x0) [ 1358.294262] BTRFS error (device loop5): superblock checksum mismatch [ 1358.305433] BTRFS error (device loop5): open_ctree failed [ 1358.323676] BTRFS error (device loop5): superblock checksum mismatch 21:25:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, 0x0) 21:25:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1358.343699] BTRFS error (device loop5): open_ctree failed [ 1358.356840] BTRFS error (device loop5): superblock checksum mismatch 21:25:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:25:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1358.453619] BTRFS error (device loop5): open_ctree failed [ 1358.489181] BTRFS error (device loop5): superblock checksum mismatch 21:25:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1358.505969] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, 0x0) [ 1358.574829] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:25:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) [ 1358.748219] BTRFS error (device loop5): open_ctree failed 21:25:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1358.886077] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13179) [ 1358.899947] BTRFS error (device loop5): superblock checksum mismatch 21:25:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1358.945051] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1359.088541] BTRFS error (device loop5): open_ctree failed [ 1359.095039] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13207) [ 1359.113104] BTRFS error (device loop5): superblock checksum mismatch 21:25:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1359.175078] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13215) 21:25:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1359.222084] BTRFS error (device loop5): open_ctree failed [ 1359.228002] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by syz-executor.2 (13223) [ 1359.251985] BTRFS error (device loop5): superblock checksum mismatch 21:25:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1359.267981] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by systemd-udevd (1663) 21:25:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1359.320855] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1359.423434] BTRFS error (device loop5): open_ctree failed 21:25:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) 21:25:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000000003f0005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1359.533865] BTRFS error (device loop5): superblock checksum mismatch [ 1359.547827] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13250) [ 1359.564705] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by syz-executor.2 (13248) 21:25:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000150800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1359.640794] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1359.698246] BTRFS error (device loop5): open_ctree failed [ 1359.706059] BTRFS error (device loop5): superblock checksum mismatch 21:25:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1359.738255] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13271) 21:25:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1359.779095] BTRFS error (device loop5): open_ctree failed [ 1359.783542] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by syz-executor.2 (13281) [ 1359.808734] BTRFS error (device loop5): superblock checksum mismatch 21:25:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff000000080036f102000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1359.818460] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13275) 21:25:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1359.903468] BTRFS error (device loop5): open_ctree failed 21:25:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) [ 1360.090562] BTRFS error (device loop5): superblock checksum mismatch [ 1360.129823] BTRFS error (device loop5): open_ctree failed [ 1360.156762] BTRFS error (device loop5): superblock checksum mismatch 21:25:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1360.202975] BTRFS error (device loop5): open_ctree failed [ 1360.249996] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by systemd-udevd (1663) [ 1360.272129] BTRFS error (device loop4): superblock checksum mismatch 21:25:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1360.295904] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13330) 21:25:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000fffffffb005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1360.375869] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13335) [ 1360.421427] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1360.472788] BTRFS error (device loop4): open_ctree failed [ 1360.478617] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by syz-executor.2 (13351) [ 1360.498939] BTRFS error (device loop4): superblock checksum mismatch [ 1360.508666] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by systemd-udevd (1663) 21:25:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000170800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1360.547952] BTRFS error (device loop4): open_ctree failed [ 1360.568886] BTRFS error (device loop4): superblock checksum mismatch 21:25:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@rescan_uuid_tree}]}) [ 1360.589501] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13367) 21:25:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1360.725568] BTRFS error (device loop4): open_ctree failed [ 1360.737066] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by syz-executor.2 (13377) [ 1360.753458] BTRFS error (device loop5): superblock checksum mismatch 21:25:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 1) [ 1360.775631] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1360.850472] FAULT_INJECTION: forcing a failure. [ 1360.850472] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.863528] BTRFS error (device loop5): open_ctree failed [ 1360.878291] BTRFS warning (device ): duplicate device /dev/loop2 devid 1 generation 7 scanned by systemd-udevd (1663) [ 1360.879990] BTRFS error (device loop4): superblock checksum mismatch 21:25:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1360.890815] CPU: 0 PID: 13400 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1360.904405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.913758] Call Trace: [ 1360.916354] dump_stack+0x1fc/0x2ef [ 1360.919992] should_fail.cold+0xa/0xf [ 1360.923799] ? setup_fault_attr+0x200/0x200 [ 1360.928127] ? lock_acquire+0x170/0x3c0 [ 1360.932102] __should_failslab+0x115/0x180 [ 1360.936325] should_failslab+0x5/0x10 [ 1360.940105] __kmalloc+0x2ab/0x3c0 [ 1360.943623] ? __se_sys_memfd_create+0xf8/0x440 [ 1360.948284] __se_sys_memfd_create+0xf8/0x440 [ 1360.952761] ? memfd_file_seals_ptr+0x150/0x150 [ 1360.957413] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1360.962756] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1360.967750] ? do_syscall_64+0x21/0x620 [ 1360.971736] do_syscall_64+0xf9/0x620 [ 1360.975521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.980695] RIP: 0033:0x7fe175b42109 21:25:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 2) [ 1360.984389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1361.003267] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1361.010952] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b42109 [ 1361.018199] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007fe175b9b1ee [ 1361.025451] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007fe1744b71d0 [ 1361.032700] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1361.039947] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 21:25:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000fffffffe005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1361.112963] BTRFS error (device loop4): open_ctree failed [ 1361.120547] BTRFS error (device loop4): superblock checksum mismatch [ 1361.128235] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13408) 21:25:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@rescan_uuid_tree}]}) [ 1361.182337] FAULT_INJECTION: forcing a failure. [ 1361.182337] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.198894] CPU: 0 PID: 13425 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1361.200099] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13407) [ 1361.206782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.206788] Call Trace: [ 1361.206809] dump_stack+0x1fc/0x2ef [ 1361.206830] should_fail.cold+0xa/0xf [ 1361.206847] ? setup_fault_attr+0x200/0x200 [ 1361.206864] ? lock_acquire+0x170/0x3c0 [ 1361.206884] __should_failslab+0x115/0x180 [ 1361.206902] should_failslab+0x5/0x10 [ 1361.206915] kmem_cache_alloc+0x277/0x370 [ 1361.206931] ? shmem_destroy_callback+0xb0/0xb0 [ 1361.206946] shmem_alloc_inode+0x18/0x40 [ 1361.206960] ? shmem_destroy_callback+0xb0/0xb0 [ 1361.206974] alloc_inode+0x5d/0x180 [ 1361.206986] new_inode+0x1d/0xf0 [ 1361.207001] shmem_get_inode+0x96/0x8d0 [ 1361.207019] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1361.207035] shmem_file_setup+0x61/0x90 [ 1361.291387] __se_sys_memfd_create+0x26b/0x440 [ 1361.295960] ? memfd_file_seals_ptr+0x150/0x150 [ 1361.300619] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1361.305975] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1361.310980] ? do_syscall_64+0x21/0x620 [ 1361.314948] do_syscall_64+0xf9/0x620 [ 1361.318741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.323907] RIP: 0033:0x7fe175b42109 [ 1361.327599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1361.346505] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1361.354196] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b42109 [ 1361.361445] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007fe175b9b1ee [ 1361.368695] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007fe1744b71d0 [ 1361.375942] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 21:25:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 3) [ 1361.383191] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 21:25:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000700000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@rescan_uuid_tree}]}) [ 1361.457122] BTRFS error (device loop4): open_ctree failed [ 1361.491613] FAULT_INJECTION: forcing a failure. [ 1361.491613] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.504339] CPU: 0 PID: 13440 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1361.512222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.521556] Call Trace: [ 1361.524130] dump_stack+0x1fc/0x2ef [ 1361.527748] should_fail.cold+0xa/0xf [ 1361.531532] ? setup_fault_attr+0x200/0x200 [ 1361.535834] ? lock_acquire+0x170/0x3c0 [ 1361.539794] __should_failslab+0x115/0x180 [ 1361.544020] should_failslab+0x5/0x10 [ 1361.547801] kmem_cache_alloc+0x277/0x370 [ 1361.551930] __d_alloc+0x2b/0xa10 [ 1361.555366] d_alloc_pseudo+0x19/0x70 [ 1361.559147] alloc_file_pseudo+0xc6/0x250 [ 1361.563275] ? alloc_file+0x4d0/0x4d0 [ 1361.567067] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1361.572675] ? shmem_get_inode+0x44c/0x8d0 [ 1361.576895] __shmem_file_setup.part.0+0x102/0x2b0 [ 1361.581812] shmem_file_setup+0x61/0x90 [ 1361.585779] __se_sys_memfd_create+0x26b/0x440 [ 1361.590342] ? memfd_file_seals_ptr+0x150/0x150 [ 1361.594990] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1361.600333] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1361.605327] ? do_syscall_64+0x21/0x620 [ 1361.609281] do_syscall_64+0xf9/0x620 [ 1361.613061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.618229] RIP: 0033:0x7fe175b42109 [ 1361.621919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1361.640804] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1361.648492] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b42109 21:25:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 4) [ 1361.655739] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007fe175b9b1ee [ 1361.662992] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007fe1744b71d0 [ 1361.670245] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1361.677491] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 21:25:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000004000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1361.806399] FAULT_INJECTION: forcing a failure. [ 1361.806399] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.838677] BTRFS error (device loop4): superblock checksum mismatch [ 1361.848765] CPU: 1 PID: 13454 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1361.853518] BTRFS error (device loop4): open_ctree failed [ 1361.856657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.856664] Call Trace: [ 1361.856685] dump_stack+0x1fc/0x2ef [ 1361.856704] should_fail.cold+0xa/0xf [ 1361.856723] ? setup_fault_attr+0x200/0x200 [ 1361.885825] ? lock_acquire+0x170/0x3c0 [ 1361.889794] __should_failslab+0x115/0x180 [ 1361.894020] should_failslab+0x5/0x10 [ 1361.897807] kmem_cache_alloc+0x277/0x370 [ 1361.901943] __alloc_file+0x21/0x340 [ 1361.905646] alloc_empty_file+0x6d/0x170 [ 1361.909695] alloc_file+0x5e/0x4d0 [ 1361.913223] alloc_file_pseudo+0x165/0x250 [ 1361.917443] ? alloc_file+0x4d0/0x4d0 [ 1361.921228] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1361.926836] ? shmem_get_inode+0x44c/0x8d0 [ 1361.931059] __shmem_file_setup.part.0+0x102/0x2b0 [ 1361.935978] shmem_file_setup+0x61/0x90 [ 1361.939937] __se_sys_memfd_create+0x26b/0x440 [ 1361.944501] ? memfd_file_seals_ptr+0x150/0x150 [ 1361.949164] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1361.954513] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1361.959516] ? do_syscall_64+0x21/0x620 [ 1361.963475] do_syscall_64+0xf9/0x620 [ 1361.967264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.972437] RIP: 0033:0x7fe175b42109 [ 1361.976136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1361.995018] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1362.002709] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b42109 [ 1362.009960] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007fe175b9b1ee [ 1362.017210] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007fe1744b71d0 [ 1362.024461] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1362.031714] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 1362.056687] BTRFS error (device loop4): superblock checksum mismatch [ 1362.068642] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13457) 21:25:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 5) [ 1362.104522] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13458) 21:25:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1362.154747] FAULT_INJECTION: forcing a failure. [ 1362.154747] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.170915] CPU: 0 PID: 13473 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1362.178816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.188161] Call Trace: [ 1362.190734] dump_stack+0x1fc/0x2ef [ 1362.194346] should_fail.cold+0xa/0xf [ 1362.198142] ? setup_fault_attr+0x200/0x200 [ 1362.202453] ? lock_acquire+0x170/0x3c0 [ 1362.206412] __should_failslab+0x115/0x180 [ 1362.210628] should_failslab+0x5/0x10 [ 1362.214406] kmem_cache_alloc_trace+0x284/0x380 [ 1362.219060] apparmor_file_alloc_security+0x394/0xad0 [ 1362.224232] ? apparmor_file_receive+0x160/0x160 [ 1362.228975] ? __alloc_file+0x21/0x340 [ 1362.232850] security_file_alloc+0x40/0x90 [ 1362.237081] __alloc_file+0xd8/0x340 [ 1362.240790] alloc_empty_file+0x6d/0x170 [ 1362.244857] alloc_file+0x5e/0x4d0 [ 1362.248385] alloc_file_pseudo+0x165/0x250 [ 1362.252613] ? alloc_file+0x4d0/0x4d0 [ 1362.256409] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1362.262016] ? shmem_get_inode+0x44c/0x8d0 [ 1362.266235] __shmem_file_setup.part.0+0x102/0x2b0 [ 1362.271150] shmem_file_setup+0x61/0x90 [ 1362.275111] __se_sys_memfd_create+0x26b/0x440 [ 1362.279675] ? memfd_file_seals_ptr+0x150/0x150 [ 1362.284327] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1362.289673] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1362.294765] ? do_syscall_64+0x21/0x620 [ 1362.298732] do_syscall_64+0xf9/0x620 [ 1362.302527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1362.307704] RIP: 0033:0x7fe175b42109 [ 1362.311409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1362.330299] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1362.337989] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b42109 [ 1362.345237] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007fe175b9b1ee 21:25:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1362.352486] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007fe1744b71d0 [ 1362.359741] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1362.366996] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 1362.379474] BTRFS error (device loop4): open_ctree failed 21:25:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 6) [ 1362.406996] BTRFS error (device loop5): superblock checksum mismatch [ 1362.478031] FAULT_INJECTION: forcing a failure. [ 1362.478031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1362.492673] CPU: 1 PID: 13486 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1362.500579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.509936] Call Trace: [ 1362.512530] dump_stack+0x1fc/0x2ef [ 1362.516161] should_fail.cold+0xa/0xf [ 1362.519963] ? lock_acquire+0x170/0x3c0 [ 1362.523928] ? setup_fault_attr+0x200/0x200 [ 1362.528247] __alloc_pages_nodemask+0x239/0x2890 [ 1362.533000] ? __lock_acquire+0x6de/0x3ff0 [ 1362.537228] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1362.542060] ? __lock_acquire+0x6de/0x3ff0 [ 1362.546289] ? mark_held_locks+0xf0/0xf0 [ 1362.550338] ? unwind_next_frame+0xeee/0x1400 [ 1362.554822] ? mark_held_locks+0xf0/0xf0 [ 1362.558870] ? deref_stack_reg+0x134/0x1d0 [ 1362.563089] ? get_reg+0x176/0x1f0 [ 1362.566619] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1362.572491] alloc_pages_vma+0xf2/0x780 [ 1362.576461] shmem_alloc_page+0x11c/0x1f0 [ 1362.580594] ? shmem_swapin+0x220/0x220 [ 1362.584568] ? percpu_counter_add_batch+0x126/0x180 [ 1362.589569] ? __vm_enough_memory+0x316/0x650 [ 1362.594063] shmem_alloc_and_acct_page+0x15a/0x850 [ 1362.598981] shmem_getpage_gfp+0x4e9/0x37f0 [ 1362.603304] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1362.608392] ? mark_held_locks+0xa6/0xf0 [ 1362.612438] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1362.617611] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1362.622790] shmem_write_begin+0xff/0x1e0 [ 1362.626927] generic_perform_write+0x1f8/0x4d0 [ 1362.631502] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1362.636155] ? current_time+0x1c0/0x1c0 [ 1362.640117] ? lock_acquire+0x170/0x3c0 [ 1362.644076] __generic_file_write_iter+0x24b/0x610 [ 1362.648992] generic_file_write_iter+0x3f8/0x730 [ 1362.653738] __vfs_write+0x51b/0x770 [ 1362.657439] ? kernel_read+0x110/0x110 [ 1362.661321] ? check_preemption_disabled+0x41/0x280 [ 1362.666328] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1362.671333] vfs_write+0x1f3/0x540 [ 1362.674863] __x64_sys_pwrite64+0x1f7/0x250 [ 1362.679172] ? ksys_pwrite64+0x1a0/0x1a0 [ 1362.683222] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1362.688223] ? do_syscall_64+0x21/0x620 [ 1362.692186] do_syscall_64+0xf9/0x620 [ 1362.695978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1362.701148] RIP: 0033:0x7fe175af50d7 [ 1362.704847] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1362.723728] RSP: 002b:00007fe1744b6f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1362.731421] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175af50d7 [ 1362.738672] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 1362.745926] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1362.753181] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1362.760435] R13: 0000000000000004 R14: 00000000200009c0 R15: 0000000000000000 [ 1362.770434] ieee802154 phy0 wpan0: encryption failed: -22 [ 1362.777007] ieee802154 phy1 wpan1: encryption failed: -22 21:25:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) (fail_nth: 1) [ 1362.949783] FAULT_INJECTION: forcing a failure. [ 1362.949783] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.974284] CPU: 0 PID: 13499 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1362.982171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.991518] Call Trace: [ 1362.994098] dump_stack+0x1fc/0x2ef [ 1362.997726] should_fail.cold+0xa/0xf [ 1363.001523] ? setup_fault_attr+0x200/0x200 [ 1363.005837] ? lock_acquire+0x170/0x3c0 [ 1363.009804] __should_failslab+0x115/0x180 [ 1363.014023] should_failslab+0x5/0x10 [ 1363.017803] __kmalloc+0x2ab/0x3c0 [ 1363.021322] ? __se_sys_memfd_create+0xf8/0x440 [ 1363.025974] __se_sys_memfd_create+0xf8/0x440 [ 1363.030466] ? memfd_file_seals_ptr+0x150/0x150 [ 1363.035119] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1363.040460] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1363.045455] ? do_syscall_64+0x21/0x620 [ 1363.049409] do_syscall_64+0xf9/0x620 [ 1363.053197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.058373] RIP: 0033:0x7f396143c109 [ 1363.062067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1363.080947] RSP: 002b:00007f395fdb0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1363.088635] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f396143c109 21:25:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) (fail_nth: 2) [ 1363.095893] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f39614951ee [ 1363.103152] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f395fdb11d0 [ 1363.110402] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1363.117662] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 1363.148234] BTRFS error (device loop5): open_ctree failed [ 1363.154191] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13484) [ 1363.175936] BTRFS error (device loop5): superblock checksum mismatch [ 1363.184115] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13481) 21:25:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 7) 21:25:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1363.210206] FAULT_INJECTION: forcing a failure. [ 1363.210206] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.224509] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1363.245042] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1363.265738] CPU: 1 PID: 13505 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1363.273634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.282988] Call Trace: [ 1363.285590] dump_stack+0x1fc/0x2ef [ 1363.289229] should_fail.cold+0xa/0xf [ 1363.293037] ? setup_fault_attr+0x200/0x200 [ 1363.297354] ? lock_acquire+0x170/0x3c0 [ 1363.301319] __should_failslab+0x115/0x180 [ 1363.305543] should_failslab+0x5/0x10 [ 1363.309330] kmem_cache_alloc+0x277/0x370 [ 1363.313488] ? shmem_destroy_callback+0xb0/0xb0 [ 1363.318158] shmem_alloc_inode+0x18/0x40 [ 1363.322221] ? shmem_destroy_callback+0xb0/0xb0 [ 1363.326878] alloc_inode+0x5d/0x180 [ 1363.330493] new_inode+0x1d/0xf0 [ 1363.333863] shmem_get_inode+0x96/0x8d0 [ 1363.337836] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1363.342677] shmem_file_setup+0x61/0x90 [ 1363.346641] __se_sys_memfd_create+0x26b/0x440 [ 1363.351213] ? memfd_file_seals_ptr+0x150/0x150 [ 1363.355883] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1363.361237] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1363.366248] ? do_syscall_64+0x21/0x620 [ 1363.370214] do_syscall_64+0xf9/0x620 [ 1363.374007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.379192] RIP: 0033:0x7f396143c109 [ 1363.382899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1363.401793] RSP: 002b:00007f395fdb0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 21:25:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) (fail_nth: 3) [ 1363.409577] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f396143c109 [ 1363.416833] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f39614951ee [ 1363.424084] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f395fdb11d0 [ 1363.431336] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1363.438586] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 1363.481423] FAULT_INJECTION: forcing a failure. [ 1363.481423] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.492635] CPU: 0 PID: 13513 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1363.500499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.509842] Call Trace: [ 1363.512426] dump_stack+0x1fc/0x2ef [ 1363.516044] should_fail.cold+0xa/0xf [ 1363.519825] ? setup_fault_attr+0x200/0x200 [ 1363.524125] ? __lock_acquire+0x6de/0x3ff0 [ 1363.528337] __should_failslab+0x115/0x180 [ 1363.532553] should_failslab+0x5/0x10 [ 1363.536335] kmem_cache_alloc+0x3f/0x370 [ 1363.540375] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1363.545978] __radix_tree_create+0x314/0x540 [ 1363.550367] __radix_tree_insert+0xbb/0x5f0 [ 1363.554669] ? __radix_tree_create+0x540/0x540 [ 1363.559228] ? lock_acquire+0x170/0x3c0 [ 1363.563182] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1363.568093] shmem_add_to_page_cache+0x616/0xbb0 [ 1363.572828] ? shmem_recalc_inode+0x310/0x310 [ 1363.577303] ? __radix_tree_preload+0x1fe/0x280 [ 1363.581953] shmem_getpage_gfp+0x2004/0x37f0 [ 1363.586356] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1363.591450] ? mark_held_locks+0xa6/0xf0 [ 1363.595496] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1363.600665] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1363.605837] shmem_write_begin+0xff/0x1e0 [ 1363.609965] generic_perform_write+0x1f8/0x4d0 [ 1363.614530] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1363.619177] ? current_time+0x1c0/0x1c0 [ 1363.623129] ? lock_acquire+0x170/0x3c0 [ 1363.627081] __generic_file_write_iter+0x24b/0x610 [ 1363.631991] generic_file_write_iter+0x3f8/0x730 [ 1363.636733] __vfs_write+0x51b/0x770 [ 1363.640432] ? kernel_read+0x110/0x110 [ 1363.644317] ? check_preemption_disabled+0x41/0x280 [ 1363.649324] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1363.654318] vfs_write+0x1f3/0x540 [ 1363.657843] __x64_sys_pwrite64+0x1f7/0x250 [ 1363.662144] ? ksys_pwrite64+0x1a0/0x1a0 [ 1363.666184] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1363.671177] ? do_syscall_64+0x21/0x620 [ 1363.675130] do_syscall_64+0xf9/0x620 [ 1363.678912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.684078] RIP: 0033:0x7fe175af50d7 [ 1363.687770] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1363.706647] RSP: 002b:00007fe1744b6f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1363.714337] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175af50d7 [ 1363.721589] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 1363.728840] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1363.736088] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1363.743334] R13: 0000000000000004 R14: 00000000200009c0 R15: 0000000000000000 [ 1363.781505] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13514) 21:25:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100008cffffff005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1363.860593] FAULT_INJECTION: forcing a failure. [ 1363.860593] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.872011] CPU: 1 PID: 13525 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1363.879882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.889220] Call Trace: [ 1363.891794] dump_stack+0x1fc/0x2ef [ 1363.895439] should_fail.cold+0xa/0xf [ 1363.899239] ? setup_fault_attr+0x200/0x200 [ 1363.903546] ? lock_acquire+0x170/0x3c0 [ 1363.907508] __should_failslab+0x115/0x180 [ 1363.911726] should_failslab+0x5/0x10 [ 1363.915514] kmem_cache_alloc+0x277/0x370 [ 1363.919659] __d_alloc+0x2b/0xa10 [ 1363.923096] d_alloc_pseudo+0x19/0x70 [ 1363.926886] alloc_file_pseudo+0xc6/0x250 [ 1363.931016] ? alloc_file+0x4d0/0x4d0 [ 1363.934807] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1363.940420] ? shmem_get_inode+0x44c/0x8d0 [ 1363.944638] __shmem_file_setup.part.0+0x102/0x2b0 [ 1363.949558] shmem_file_setup+0x61/0x90 [ 1363.953528] __se_sys_memfd_create+0x26b/0x440 [ 1363.958113] ? memfd_file_seals_ptr+0x150/0x150 [ 1363.962777] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1363.968121] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1363.973131] ? do_syscall_64+0x21/0x620 [ 1363.977116] do_syscall_64+0xf9/0x620 [ 1363.980919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.986100] RIP: 0033:0x7f396143c109 [ 1363.989802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1364.008694] RSP: 002b:00007f395fdb0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1364.016392] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f396143c109 [ 1364.023662] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f39614951ee [ 1364.030919] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f395fdb11d0 [ 1364.038175] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1364.045434] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 21:25:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) (fail_nth: 4) 21:25:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 8) 21:25:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1364.112578] BTRFS error (device loop5): open_ctree failed [ 1364.168142] FAULT_INJECTION: forcing a failure. [ 1364.168142] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.180035] CPU: 1 PID: 13537 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1364.187930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.197282] Call Trace: [ 1364.199866] dump_stack+0x1fc/0x2ef [ 1364.203492] should_fail.cold+0xa/0xf [ 1364.207289] ? setup_fault_attr+0x200/0x200 [ 1364.211612] ? lock_acquire+0x170/0x3c0 [ 1364.215587] __should_failslab+0x115/0x180 [ 1364.219815] should_failslab+0x5/0x10 [ 1364.223608] kmem_cache_alloc+0x277/0x370 [ 1364.227751] __alloc_file+0x21/0x340 [ 1364.231458] alloc_empty_file+0x6d/0x170 [ 1364.235511] alloc_file+0x5e/0x4d0 [ 1364.239044] alloc_file_pseudo+0x165/0x250 [ 1364.243266] ? alloc_file+0x4d0/0x4d0 [ 1364.247054] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1364.252667] ? shmem_get_inode+0x44c/0x8d0 [ 1364.256892] __shmem_file_setup.part.0+0x102/0x2b0 [ 1364.261812] shmem_file_setup+0x61/0x90 [ 1364.265774] __se_sys_memfd_create+0x26b/0x440 [ 1364.270354] ? memfd_file_seals_ptr+0x150/0x150 [ 1364.275014] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1364.280366] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1364.285367] ? do_syscall_64+0x21/0x620 [ 1364.289332] do_syscall_64+0xf9/0x620 [ 1364.293121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.298292] RIP: 0033:0x7f396143c109 21:25:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) (fail_nth: 5) [ 1364.301992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1364.320878] RSP: 002b:00007f395fdb0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1364.328569] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f396143c109 [ 1364.335822] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f39614951ee [ 1364.343088] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f395fdb11d0 [ 1364.350349] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1364.357610] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 1364.452474] BTRFS error (device loop5): superblock checksum mismatch [ 1364.459220] BTRFS error (device loop5): open_ctree failed [ 1364.497954] BTRFS error (device loop5): superblock checksum mismatch [ 1364.528546] BTRFS error (device loop5): open_ctree failed 21:25:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1364.544637] FAULT_INJECTION: forcing a failure. [ 1364.544637] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.576795] BTRFS error (device loop5): superblock checksum mismatch [ 1364.590739] BTRFS error (device loop5): open_ctree failed [ 1364.598890] FAULT_INJECTION: forcing a failure. [ 1364.598890] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.607937] CPU: 1 PID: 13559 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1364.618063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.627415] Call Trace: [ 1364.630000] dump_stack+0x1fc/0x2ef [ 1364.633632] should_fail.cold+0xa/0xf [ 1364.637436] ? setup_fault_attr+0x200/0x200 [ 1364.641746] ? lock_acquire+0x170/0x3c0 [ 1364.645713] __should_failslab+0x115/0x180 [ 1364.649941] should_failslab+0x5/0x10 [ 1364.653730] kmem_cache_alloc_trace+0x284/0x380 [ 1364.658391] apparmor_file_alloc_security+0x394/0xad0 [ 1364.663575] ? apparmor_file_receive+0x160/0x160 [ 1364.668324] ? __alloc_file+0x21/0x340 [ 1364.672211] security_file_alloc+0x40/0x90 [ 1364.676436] __alloc_file+0xd8/0x340 [ 1364.680143] alloc_empty_file+0x6d/0x170 [ 1364.684201] alloc_file+0x5e/0x4d0 [ 1364.687735] alloc_file_pseudo+0x165/0x250 [ 1364.691959] ? alloc_file+0x4d0/0x4d0 [ 1364.695752] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1364.701366] ? shmem_get_inode+0x44c/0x8d0 [ 1364.705599] __shmem_file_setup.part.0+0x102/0x2b0 [ 1364.710529] shmem_file_setup+0x61/0x90 [ 1364.714496] __se_sys_memfd_create+0x26b/0x440 [ 1364.719065] ? memfd_file_seals_ptr+0x150/0x150 [ 1364.723720] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1364.729071] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1364.734073] ? do_syscall_64+0x21/0x620 [ 1364.738035] do_syscall_64+0xf9/0x620 [ 1364.741825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.746998] RIP: 0033:0x7f396143c109 [ 1364.750695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1364.769580] RSP: 002b:00007f395fdb0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1364.777275] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f396143c109 [ 1364.784526] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f39614951ee [ 1364.791777] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f395fdb11d0 [ 1364.799036] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1364.806289] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 1364.820687] CPU: 1 PID: 13565 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1364.828580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.836047] BTRFS error (device loop5): superblock checksum mismatch [ 1364.837923] Call Trace: 21:25:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) (fail_nth: 6) [ 1364.837944] dump_stack+0x1fc/0x2ef [ 1364.837965] should_fail.cold+0xa/0xf [ 1364.837984] ? setup_fault_attr+0x200/0x200 [ 1364.838000] ? lock_acquire+0x170/0x3c0 [ 1364.838021] __should_failslab+0x115/0x180 [ 1364.838038] should_failslab+0x5/0x10 [ 1364.870744] kmem_cache_alloc+0x277/0x370 [ 1364.874878] getname_flags+0xce/0x590 [ 1364.878663] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1364.883399] do_sys_open+0x26c/0x520 [ 1364.887105] ? filp_open+0x70/0x70 [ 1364.890634] ? do_syscall_64+0x4f/0x620 [ 1364.894594] do_syscall_64+0xf9/0x620 [ 1364.898390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.903560] RIP: 0033:0x7fe175af5024 [ 1364.907252] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1364.926147] RSP: 002b:00007fe1744b6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1364.933838] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175af5024 [ 1364.941091] RDX: 0000000000000002 RSI: 00007fe1744b6fe0 RDI: 00000000ffffff9c [ 1364.948339] RBP: 00007fe1744b6fe0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1364.955597] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1364.962853] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 9) [ 1364.998356] BTRFS error (device loop5): open_ctree failed [ 1365.013795] FAULT_INJECTION: forcing a failure. [ 1365.013795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1365.027329] CPU: 1 PID: 13574 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1365.035221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.044568] Call Trace: [ 1365.047143] dump_stack+0x1fc/0x2ef [ 1365.050765] should_fail.cold+0xa/0xf [ 1365.054561] ? lock_acquire+0x170/0x3c0 [ 1365.058654] ? setup_fault_attr+0x200/0x200 [ 1365.062972] __alloc_pages_nodemask+0x239/0x2890 [ 1365.067718] ? __lock_acquire+0x6de/0x3ff0 [ 1365.071939] ? static_obj+0x50/0x50 [ 1365.075567] ? __lock_acquire+0x6de/0x3ff0 [ 1365.079799] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1365.084634] ? __lock_acquire+0x6de/0x3ff0 [ 1365.088860] ? mark_held_locks+0xf0/0xf0 [ 1365.092922] ? unwind_next_frame+0xeee/0x1400 [ 1365.097435] ? mark_held_locks+0xf0/0xf0 [ 1365.101488] ? deref_stack_reg+0x134/0x1d0 [ 1365.105706] ? get_reg+0x176/0x1f0 [ 1365.109232] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1365.115114] alloc_pages_vma+0xf2/0x780 [ 1365.119085] shmem_alloc_page+0x11c/0x1f0 [ 1365.123218] ? shmem_swapin+0x220/0x220 [ 1365.127203] ? percpu_counter_add_batch+0x126/0x180 [ 1365.132220] ? __vm_enough_memory+0x316/0x650 [ 1365.136714] shmem_alloc_and_acct_page+0x15a/0x850 [ 1365.141634] shmem_getpage_gfp+0x4e9/0x37f0 [ 1365.145948] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1365.151036] ? mark_held_locks+0xa6/0xf0 [ 1365.155087] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1365.160283] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1365.165462] shmem_write_begin+0xff/0x1e0 [ 1365.169596] generic_perform_write+0x1f8/0x4d0 [ 1365.174187] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1365.178850] ? current_time+0x1c0/0x1c0 [ 1365.182815] ? lock_acquire+0x170/0x3c0 [ 1365.186773] __generic_file_write_iter+0x24b/0x610 [ 1365.191691] generic_file_write_iter+0x3f8/0x730 [ 1365.196453] __vfs_write+0x51b/0x770 [ 1365.200167] ? kernel_read+0x110/0x110 [ 1365.204047] ? check_preemption_disabled+0x41/0x280 [ 1365.209049] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1365.214064] vfs_write+0x1f3/0x540 [ 1365.217605] __x64_sys_pwrite64+0x1f7/0x250 [ 1365.221911] ? ksys_pwrite64+0x1a0/0x1a0 [ 1365.225957] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1365.230954] ? do_syscall_64+0x21/0x620 [ 1365.234924] do_syscall_64+0xf9/0x620 [ 1365.238718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.243887] RIP: 0033:0x7f39613ef0d7 [ 1365.247578] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1365.266471] RSP: 002b:00007f395fdb0f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1365.274174] RAX: ffffffffffffffda RBX: 00007f3961485a20 RCX: 00007f39613ef0d7 [ 1365.281434] RDX: 00000000000000cf RSI: 0000000020010000 RDI: 0000000000000004 [ 1365.288685] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f395fdb11d0 21:25:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1365.295946] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1365.303204] R13: 0000000000000004 R14: 00000000200009c0 R15: 0000000000000000 [ 1365.350836] FAULT_INJECTION: forcing a failure. [ 1365.350836] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1365.362659] CPU: 0 PID: 13580 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1365.370539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.379878] Call Trace: [ 1365.382455] dump_stack+0x1fc/0x2ef [ 1365.386065] should_fail.cold+0xa/0xf [ 1365.389850] ? setup_fault_attr+0x200/0x200 [ 1365.394151] ? do_writepages+0x290/0x290 [ 1365.398193] ? unlock_page+0x13d/0x230 [ 1365.402064] __alloc_pages_nodemask+0x239/0x2890 [ 1365.406801] ? generic_perform_write+0x36c/0x4d0 [ 1365.411537] ? __lock_acquire+0x6de/0x3ff0 [ 1365.415758] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1365.420590] ? lock_downgrade+0x720/0x720 [ 1365.424729] ? lock_acquire+0x170/0x3c0 [ 1365.428700] ? up_write+0x18/0x150 [ 1365.432242] ? generic_file_write_iter+0x381/0x730 [ 1365.437164] cache_grow_begin+0xa4/0x8a0 [ 1365.441205] ? setup_fault_attr+0x200/0x200 [ 1365.445505] ? lock_acquire+0x170/0x3c0 [ 1365.449459] cache_alloc_refill+0x273/0x340 [ 1365.453763] kmem_cache_alloc+0x346/0x370 [ 1365.457892] getname_flags+0xce/0x590 [ 1365.461674] do_sys_open+0x26c/0x520 [ 1365.465376] ? filp_open+0x70/0x70 [ 1365.468905] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1365.474252] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1365.479250] ? do_syscall_64+0x21/0x620 [ 1365.483203] do_syscall_64+0xf9/0x620 [ 1365.486987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.492153] RIP: 0033:0x7fe175af5024 [ 1365.495846] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1365.514727] RSP: 002b:00007fe1744b6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1365.522413] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175af5024 [ 1365.529664] RDX: 0000000000000002 RSI: 00007fe1744b6fe0 RDI: 00000000ffffff9c [ 1365.536911] RBP: 00007fe1744b6fe0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1365.544159] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 21:25:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1365.551405] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) (fail_nth: 7) [ 1365.713949] BTRFS error (device loop1): superblock checksum mismatch 21:25:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 10) [ 1365.764758] BTRFS error (device loop1): open_ctree failed [ 1365.773612] BTRFS error (device loop1): superblock checksum mismatch [ 1365.783543] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13599) 21:25:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1365.809803] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1365.840649] FAULT_INJECTION: forcing a failure. [ 1365.840649] name failslab, interval 1, probability 0, space 0, times 0 [ 1365.845021] FAULT_INJECTION: forcing a failure. [ 1365.845021] name failslab, interval 1, probability 0, space 0, times 0 [ 1365.851866] CPU: 0 PID: 13612 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1365.851876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.851881] Call Trace: [ 1365.851902] dump_stack+0x1fc/0x2ef [ 1365.851925] should_fail.cold+0xa/0xf [ 1365.890227] ? setup_fault_attr+0x200/0x200 [ 1365.894547] ? __lock_acquire+0x6de/0x3ff0 [ 1365.898773] __should_failslab+0x115/0x180 [ 1365.902999] should_failslab+0x5/0x10 [ 1365.906786] kmem_cache_alloc+0x3f/0x370 [ 1365.910838] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1365.916451] __radix_tree_create+0x314/0x540 [ 1365.920867] __radix_tree_insert+0xbb/0x5f0 [ 1365.925190] ? __radix_tree_create+0x540/0x540 [ 1365.929763] ? lock_acquire+0x170/0x3c0 [ 1365.933727] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1365.938659] shmem_add_to_page_cache+0x616/0xbb0 [ 1365.943406] ? shmem_recalc_inode+0x310/0x310 [ 1365.947891] ? __radix_tree_preload+0x1fe/0x280 [ 1365.952557] shmem_getpage_gfp+0x2004/0x37f0 [ 1365.956963] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1365.962055] ? mark_held_locks+0xa6/0xf0 [ 1365.966116] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1365.971309] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1365.976495] shmem_write_begin+0xff/0x1e0 [ 1365.980635] generic_perform_write+0x1f8/0x4d0 [ 1365.985213] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1365.989868] ? current_time+0x1c0/0x1c0 [ 1365.993835] ? lock_acquire+0x170/0x3c0 [ 1365.997801] __generic_file_write_iter+0x24b/0x610 [ 1366.002722] generic_file_write_iter+0x3f8/0x730 [ 1366.007472] __vfs_write+0x51b/0x770 [ 1366.011182] ? kernel_read+0x110/0x110 [ 1366.015066] ? check_preemption_disabled+0x41/0x280 [ 1366.020075] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1366.025080] vfs_write+0x1f3/0x540 [ 1366.028610] __x64_sys_pwrite64+0x1f7/0x250 [ 1366.032916] ? ksys_pwrite64+0x1a0/0x1a0 [ 1366.036964] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1366.041967] ? do_syscall_64+0x21/0x620 [ 1366.045928] do_syscall_64+0xf9/0x620 [ 1366.049719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1366.054895] RIP: 0033:0x7f39613ef0d7 [ 1366.058597] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1366.077481] RSP: 002b:00007f395fdb0f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1366.085176] RAX: ffffffffffffffda RBX: 00007f3961485a20 RCX: 00007f39613ef0d7 [ 1366.092430] RDX: 00000000000000cf RSI: 0000000020010000 RDI: 0000000000000004 [ 1366.099681] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f395fdb11d0 [ 1366.106933] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1366.114190] R13: 0000000000000004 R14: 00000000200009c0 R15: 0000000000000000 [ 1366.127736] CPU: 0 PID: 13614 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1366.133262] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13601) [ 1366.135621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.135627] Call Trace: [ 1366.135647] dump_stack+0x1fc/0x2ef [ 1366.135665] should_fail.cold+0xa/0xf [ 1366.135686] ? setup_fault_attr+0x200/0x200 [ 1366.170975] ? lock_acquire+0x170/0x3c0 [ 1366.174960] __should_failslab+0x115/0x180 [ 1366.179205] should_failslab+0x5/0x10 [ 1366.183006] kmem_cache_alloc_trace+0x284/0x380 [ 1366.187685] apparmor_file_alloc_security+0x394/0xad0 [ 1366.192884] ? apparmor_file_receive+0x160/0x160 [ 1366.197639] ? __alloc_file+0x21/0x340 [ 1366.201528] security_file_alloc+0x40/0x90 [ 1366.205755] __alloc_file+0xd8/0x340 [ 1366.209457] alloc_empty_file+0x6d/0x170 [ 1366.213507] path_openat+0xe9/0x2df0 [ 1366.217207] ? __lock_acquire+0x6de/0x3ff0 [ 1366.221446] ? path_lookupat+0x8d0/0x8d0 [ 1366.225497] ? mark_held_locks+0xf0/0xf0 [ 1366.229545] ? mark_held_locks+0xf0/0xf0 [ 1366.233606] do_filp_open+0x18c/0x3f0 [ 1366.237392] ? may_open_dev+0xf0/0xf0 [ 1366.241182] ? __alloc_fd+0x28d/0x570 [ 1366.244972] ? lock_downgrade+0x720/0x720 [ 1366.249104] ? lock_acquire+0x170/0x3c0 [ 1366.253062] ? __alloc_fd+0x34/0x570 [ 1366.256764] ? do_raw_spin_unlock+0x171/0x230 [ 1366.261250] ? _raw_spin_unlock+0x29/0x40 [ 1366.265387] ? __alloc_fd+0x28d/0x570 [ 1366.269184] do_sys_open+0x3b3/0x520 [ 1366.272887] ? filp_open+0x70/0x70 [ 1366.276419] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1366.281770] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1366.286772] ? do_syscall_64+0x21/0x620 [ 1366.290733] do_syscall_64+0xf9/0x620 [ 1366.294523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1366.299705] RIP: 0033:0x7fe175af5024 21:25:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1366.303405] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1366.322289] RSP: 002b:00007fe1744b6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1366.329981] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175af5024 [ 1366.337233] RDX: 0000000000000002 RSI: 00007fe1744b6fe0 RDI: 00000000ffffff9c [ 1366.344484] RBP: 00007fe1744b6fe0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1366.351738] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1366.358992] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 11) 21:25:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1366.415957] BTRFS error (device loop1): open_ctree failed [ 1366.444326] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1366.465379] BTRFS error (device loop5): superblock checksum mismatch 21:25:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1366.515994] FAULT_INJECTION: forcing a failure. [ 1366.515994] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.529731] CPU: 1 PID: 13631 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1366.537622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.546966] Call Trace: [ 1366.549545] dump_stack+0x1fc/0x2ef [ 1366.553163] should_fail.cold+0xa/0xf [ 1366.556953] ? setup_fault_attr+0x200/0x200 [ 1366.561262] ? lock_acquire+0x170/0x3c0 [ 1366.565228] __should_failslab+0x115/0x180 [ 1366.569452] should_failslab+0x5/0x10 [ 1366.573237] kmem_cache_alloc_trace+0x284/0x380 [ 1366.577897] apparmor_file_alloc_security+0x394/0xad0 [ 1366.583076] ? apparmor_file_receive+0x160/0x160 [ 1366.587819] ? __alloc_file+0x21/0x340 [ 1366.591699] security_file_alloc+0x40/0x90 [ 1366.595923] __alloc_file+0xd8/0x340 [ 1366.599628] alloc_empty_file+0x6d/0x170 [ 1366.603677] path_openat+0xe9/0x2df0 [ 1366.607380] ? __lock_acquire+0x6de/0x3ff0 [ 1366.611609] ? path_lookupat+0x8d0/0x8d0 [ 1366.615661] ? mark_held_locks+0xf0/0xf0 [ 1366.619714] do_filp_open+0x18c/0x3f0 [ 1366.623499] ? may_open_dev+0xf0/0xf0 [ 1366.627289] ? __alloc_fd+0x28d/0x570 [ 1366.631078] ? lock_downgrade+0x720/0x720 [ 1366.635217] ? lock_acquire+0x170/0x3c0 [ 1366.639174] ? __alloc_fd+0x34/0x570 [ 1366.642874] ? do_raw_spin_unlock+0x171/0x230 [ 1366.647354] ? _raw_spin_unlock+0x29/0x40 [ 1366.651484] ? __alloc_fd+0x28d/0x570 [ 1366.655274] do_sys_open+0x3b3/0x520 [ 1366.658977] ? filp_open+0x70/0x70 [ 1366.662507] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1366.667856] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1366.672857] ? do_syscall_64+0x21/0x620 [ 1366.676817] do_syscall_64+0xf9/0x620 [ 1366.680604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1366.685781] RIP: 0033:0x7fe175af5024 [ 1366.689481] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1366.708362] RSP: 002b:00007fe1744b6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 21:25:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 12) [ 1366.716056] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175af5024 [ 1366.723310] RDX: 0000000000000002 RSI: 00007fe1744b6fe0 RDI: 00000000ffffff9c [ 1366.730563] RBP: 00007fe1744b6fe0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1366.737815] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1366.745065] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1366.856390] BTRFS error (device loop5): open_ctree failed [ 1366.879562] FAULT_INJECTION: forcing a failure. [ 1366.879562] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.890968] CPU: 0 PID: 13648 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1366.898835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.908183] Call Trace: [ 1366.910754] dump_stack+0x1fc/0x2ef [ 1366.914365] should_fail.cold+0xa/0xf [ 1366.918149] ? setup_fault_attr+0x200/0x200 [ 1366.922460] ? lock_acquire+0x170/0x3c0 [ 1366.926421] __should_failslab+0x115/0x180 [ 1366.930640] should_failslab+0x5/0x10 [ 1366.934426] kmem_cache_alloc+0x277/0x370 [ 1366.938557] __kernfs_new_node+0xd2/0x680 [ 1366.942687] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1366.947425] ? __cpu_to_node+0x7b/0xa0 [ 1366.951302] ? account_entity_enqueue+0x2e5/0x440 [ 1366.956135] ? mark_held_locks+0xf0/0xf0 [ 1366.960188] ? enqueue_entity+0xf86/0x3850 [ 1366.964421] ? set_user_nice.part.0+0x3b9/0xab0 [ 1366.969102] kernfs_create_dir_ns+0x9e/0x230 [ 1366.973515] internal_create_group+0x1c1/0xb20 [ 1366.978091] ? sysfs_remove_link_from_group+0x70/0x70 [ 1366.983260] ? lock_downgrade+0x720/0x720 [ 1366.987394] lo_ioctl+0xf7c/0x20e0 [ 1366.990921] ? loop_set_status64+0x110/0x110 [ 1366.995313] blkdev_ioctl+0x5cb/0x1a80 [ 1366.999184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.004535] ? blkpg_ioctl+0x9d0/0x9d0 [ 1367.008403] ? mark_held_locks+0xf0/0xf0 [ 1367.012445] ? mark_held_locks+0xf0/0xf0 [ 1367.016498] ? debug_check_no_obj_freed+0x201/0x490 [ 1367.021504] ? lock_downgrade+0x720/0x720 [ 1367.025637] block_ioctl+0xe9/0x130 [ 1367.029241] ? blkdev_fallocate+0x3f0/0x3f0 [ 1367.033543] do_vfs_ioctl+0xcdb/0x12e0 [ 1367.037412] ? lock_downgrade+0x720/0x720 [ 1367.041547] ? check_preemption_disabled+0x41/0x280 [ 1367.046545] ? ioctl_preallocate+0x200/0x200 [ 1367.050934] ? __fget+0x356/0x510 [ 1367.054367] ? do_dup2+0x450/0x450 [ 1367.057887] ? do_sys_open+0x2bf/0x520 [ 1367.061772] ksys_ioctl+0x9b/0xc0 [ 1367.065218] __x64_sys_ioctl+0x6f/0xb0 [ 1367.069090] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1367.073784] do_syscall_64+0xf9/0x620 [ 1367.077573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.082744] RIP: 0033:0x7fe175b41ec7 [ 1367.086436] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1367.105320] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1367.113014] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1367.120264] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1367.127511] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1367.134761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1367.142008] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1367.185988] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13646) [ 1367.186149] BTRFS error (device loop5): superblock checksum mismatch 21:25:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 13) [ 1367.241367] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1367.273852] BTRFS error (device loop5): open_ctree failed [ 1367.282004] BTRFS error (device loop5): superblock checksum mismatch 21:25:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1367.288924] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13660) [ 1367.359201] FAULT_INJECTION: forcing a failure. [ 1367.359201] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.370738] CPU: 1 PID: 13674 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1367.378621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.387954] Call Trace: [ 1367.390533] dump_stack+0x1fc/0x2ef [ 1367.394146] should_fail.cold+0xa/0xf [ 1367.397945] ? setup_fault_attr+0x200/0x200 [ 1367.402258] ? lock_acquire+0x170/0x3c0 [ 1367.406222] __should_failslab+0x115/0x180 [ 1367.410455] should_failslab+0x5/0x10 [ 1367.414253] kmem_cache_alloc+0x277/0x370 [ 1367.418388] __kernfs_new_node+0xd2/0x680 [ 1367.422521] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1367.427256] ? kernfs_activate+0x2c/0x1d0 [ 1367.431386] ? lock_downgrade+0x720/0x720 [ 1367.435519] ? kernfs_add_one+0x51/0x4c0 [ 1367.439561] ? mutex_trylock+0x1a0/0x1a0 [ 1367.443605] ? __mutex_unlock_slowpath+0xea/0x610 [ 1367.448431] kernfs_new_node+0x92/0x120 [ 1367.452395] __kernfs_create_file+0x51/0x340 [ 1367.456787] sysfs_add_file_mode_ns+0x226/0x540 [ 1367.461449] internal_create_group+0x355/0xb20 [ 1367.466028] ? sysfs_remove_link_from_group+0x70/0x70 [ 1367.471208] ? lock_downgrade+0x720/0x720 [ 1367.475365] lo_ioctl+0xf7c/0x20e0 [ 1367.478892] ? loop_set_status64+0x110/0x110 [ 1367.483289] blkdev_ioctl+0x5cb/0x1a80 [ 1367.487158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.492505] ? blkpg_ioctl+0x9d0/0x9d0 [ 1367.496374] ? mark_held_locks+0xf0/0xf0 [ 1367.500414] ? mark_held_locks+0xf0/0xf0 [ 1367.504466] ? debug_check_no_obj_freed+0x201/0x490 [ 1367.509476] ? lock_downgrade+0x720/0x720 [ 1367.513616] block_ioctl+0xe9/0x130 [ 1367.517231] ? blkdev_fallocate+0x3f0/0x3f0 [ 1367.521532] do_vfs_ioctl+0xcdb/0x12e0 [ 1367.525403] ? lock_downgrade+0x720/0x720 [ 1367.529535] ? check_preemption_disabled+0x41/0x280 [ 1367.534533] ? ioctl_preallocate+0x200/0x200 [ 1367.538925] ? __fget+0x356/0x510 [ 1367.542357] ? do_dup2+0x450/0x450 [ 1367.545877] ? do_sys_open+0x2bf/0x520 [ 1367.549755] ksys_ioctl+0x9b/0xc0 [ 1367.553199] __x64_sys_ioctl+0x6f/0xb0 [ 1367.557079] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1367.561665] do_syscall_64+0xf9/0x620 [ 1367.565472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.570645] RIP: 0033:0x7fe175b41ec7 [ 1367.574343] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1367.593225] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1367.600911] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1367.608161] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1367.615415] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1367.622672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1367.629927] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 [ 1367.657749] BTRFS error (device loop5): open_ctree failed 21:25:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 14) [ 1367.866862] BTRFS error (device loop5): superblock checksum mismatch [ 1367.891381] BTRFS error (device loop5): open_ctree failed [ 1367.895879] FAULT_INJECTION: forcing a failure. [ 1367.895879] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.908473] CPU: 0 PID: 13706 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1367.916363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.925711] Call Trace: [ 1367.928294] dump_stack+0x1fc/0x2ef [ 1367.931920] should_fail.cold+0xa/0xf [ 1367.935710] ? setup_fault_attr+0x200/0x200 [ 1367.940019] ? lock_acquire+0x170/0x3c0 [ 1367.943984] __should_failslab+0x115/0x180 [ 1367.948211] should_failslab+0x5/0x10 [ 1367.951996] kmem_cache_alloc+0x277/0x370 [ 1367.956138] __kernfs_new_node+0xd2/0x680 [ 1367.960274] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1367.965019] ? __mutex_unlock_slowpath+0xea/0x610 [ 1367.969847] ? wait_for_completion_io+0x10/0x10 [ 1367.974504] ? kernfs_next_descendant_post+0x19c/0x290 [ 1367.979771] kernfs_new_node+0x92/0x120 [ 1367.983735] __kernfs_create_file+0x51/0x340 [ 1367.988133] sysfs_add_file_mode_ns+0x226/0x540 [ 1367.992796] internal_create_group+0x355/0xb20 [ 1367.997369] ? sysfs_remove_link_from_group+0x70/0x70 [ 1368.002545] ? lock_downgrade+0x720/0x720 [ 1368.006687] lo_ioctl+0xf7c/0x20e0 [ 1368.010220] ? loop_set_status64+0x110/0x110 [ 1368.014617] blkdev_ioctl+0x5cb/0x1a80 [ 1368.018492] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.023840] ? blkpg_ioctl+0x9d0/0x9d0 [ 1368.027716] ? mark_held_locks+0xf0/0xf0 [ 1368.031762] ? mark_held_locks+0xf0/0xf0 [ 1368.035812] ? debug_check_no_obj_freed+0x201/0x490 [ 1368.040817] ? lock_downgrade+0x720/0x720 [ 1368.044952] block_ioctl+0xe9/0x130 [ 1368.048561] ? blkdev_fallocate+0x3f0/0x3f0 [ 1368.052891] do_vfs_ioctl+0xcdb/0x12e0 [ 1368.056771] ? lock_downgrade+0x720/0x720 [ 1368.060906] ? check_preemption_disabled+0x41/0x280 [ 1368.065904] ? ioctl_preallocate+0x200/0x200 [ 1368.070304] ? __fget+0x356/0x510 [ 1368.073743] ? do_dup2+0x450/0x450 [ 1368.077268] ? do_sys_open+0x2bf/0x520 [ 1368.081147] ksys_ioctl+0x9b/0xc0 [ 1368.084589] __x64_sys_ioctl+0x6f/0xb0 [ 1368.088462] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1368.093030] do_syscall_64+0xf9/0x620 [ 1368.096820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.101995] RIP: 0033:0x7fe175b41ec7 [ 1368.105698] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1368.124580] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1368.132270] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1368.139524] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1368.146774] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1368.154032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1368.161285] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1368.197035] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13711) [ 1368.228870] BTRFS error (device loop5): superblock checksum mismatch 21:25:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 15) [ 1368.253170] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13712) [ 1368.291136] BTRFS error (device loop5): open_ctree failed 21:25:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1368.305887] BTRFS error (device loop5): superblock checksum mismatch 21:25:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1368.398236] BTRFS error (device loop5): open_ctree failed [ 1368.410031] FAULT_INJECTION: forcing a failure. [ 1368.410031] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.430023] CPU: 0 PID: 13731 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1368.437917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.447269] Call Trace: [ 1368.449865] dump_stack+0x1fc/0x2ef [ 1368.453518] should_fail.cold+0xa/0xf [ 1368.457317] ? setup_fault_attr+0x200/0x200 [ 1368.461623] ? lock_acquire+0x170/0x3c0 [ 1368.465585] __should_failslab+0x115/0x180 [ 1368.469804] should_failslab+0x5/0x10 [ 1368.473595] kmem_cache_alloc+0x277/0x370 [ 1368.477737] __kernfs_new_node+0xd2/0x680 [ 1368.481867] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1368.486604] ? __mutex_unlock_slowpath+0xea/0x610 [ 1368.491427] ? wait_for_completion_io+0x10/0x10 [ 1368.496105] ? kernfs_next_descendant_post+0x19c/0x290 [ 1368.501366] kernfs_new_node+0x92/0x120 [ 1368.505328] __kernfs_create_file+0x51/0x340 [ 1368.509719] sysfs_add_file_mode_ns+0x226/0x540 [ 1368.514372] internal_create_group+0x355/0xb20 [ 1368.518936] ? sysfs_remove_link_from_group+0x70/0x70 [ 1368.524108] ? lock_downgrade+0x720/0x720 [ 1368.528250] lo_ioctl+0xf7c/0x20e0 [ 1368.531773] ? loop_set_status64+0x110/0x110 [ 1368.536163] blkdev_ioctl+0x5cb/0x1a80 [ 1368.540034] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.545377] ? blkpg_ioctl+0x9d0/0x9d0 [ 1368.549254] ? mark_held_locks+0xf0/0xf0 [ 1368.553311] ? mark_held_locks+0xf0/0xf0 [ 1368.557371] ? debug_check_no_obj_freed+0x201/0x490 [ 1368.562384] ? lock_downgrade+0x720/0x720 [ 1368.566512] block_ioctl+0xe9/0x130 [ 1368.570117] ? blkdev_fallocate+0x3f0/0x3f0 [ 1368.574418] do_vfs_ioctl+0xcdb/0x12e0 [ 1368.578292] ? lock_downgrade+0x720/0x720 [ 1368.582423] ? check_preemption_disabled+0x41/0x280 [ 1368.587418] ? ioctl_preallocate+0x200/0x200 [ 1368.591809] ? __fget+0x356/0x510 [ 1368.595241] ? do_dup2+0x450/0x450 [ 1368.598761] ? do_sys_open+0x2bf/0x520 [ 1368.602632] ksys_ioctl+0x9b/0xc0 [ 1368.606085] __x64_sys_ioctl+0x6f/0xb0 [ 1368.609962] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1368.614527] do_syscall_64+0xf9/0x620 [ 1368.618324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.623492] RIP: 0033:0x7fe175b41ec7 [ 1368.627192] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1368.646080] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1368.653785] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1368.661125] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1368.668479] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1368.675732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1368.682988] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 16) 21:25:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1368.804231] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13739) [ 1368.823076] BTRFS error (device loop5): superblock checksum mismatch [ 1368.874156] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13741) [ 1368.880105] FAULT_INJECTION: forcing a failure. [ 1368.880105] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.900443] CPU: 0 PID: 13765 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1368.908316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.917652] Call Trace: [ 1368.920229] dump_stack+0x1fc/0x2ef [ 1368.923859] should_fail.cold+0xa/0xf [ 1368.927669] ? setup_fault_attr+0x200/0x200 [ 1368.931983] ? lock_acquire+0x170/0x3c0 [ 1368.935954] __should_failslab+0x115/0x180 [ 1368.940183] should_failslab+0x5/0x10 [ 1368.943968] kmem_cache_alloc+0x277/0x370 [ 1368.948206] __kernfs_new_node+0xd2/0x680 [ 1368.952341] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1368.957080] ? __mutex_unlock_slowpath+0xea/0x610 [ 1368.961906] ? wait_for_completion_io+0x10/0x10 [ 1368.966574] ? kernfs_next_descendant_post+0x19c/0x290 [ 1368.971845] kernfs_new_node+0x92/0x120 [ 1368.975803] __kernfs_create_file+0x51/0x340 [ 1368.980194] sysfs_add_file_mode_ns+0x226/0x540 [ 1368.984848] internal_create_group+0x355/0xb20 [ 1368.989427] ? sysfs_remove_link_from_group+0x70/0x70 [ 1368.994607] ? lock_downgrade+0x720/0x720 [ 1368.998741] lo_ioctl+0xf7c/0x20e0 [ 1369.002273] ? loop_set_status64+0x110/0x110 [ 1369.006666] blkdev_ioctl+0x5cb/0x1a80 [ 1369.010548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.015915] ? blkpg_ioctl+0x9d0/0x9d0 [ 1369.019794] ? mark_held_locks+0xf0/0xf0 [ 1369.023839] ? mark_held_locks+0xf0/0xf0 [ 1369.027884] ? debug_check_no_obj_freed+0x201/0x490 [ 1369.032892] ? lock_downgrade+0x720/0x720 [ 1369.037034] block_ioctl+0xe9/0x130 [ 1369.040648] ? blkdev_fallocate+0x3f0/0x3f0 [ 1369.044950] do_vfs_ioctl+0xcdb/0x12e0 [ 1369.048820] ? lock_downgrade+0x720/0x720 [ 1369.052949] ? check_preemption_disabled+0x41/0x280 [ 1369.057956] ? ioctl_preallocate+0x200/0x200 [ 1369.062367] ? __fget+0x356/0x510 [ 1369.065825] ? do_dup2+0x450/0x450 [ 1369.069356] ? do_sys_open+0x2bf/0x520 [ 1369.073230] ksys_ioctl+0x9b/0xc0 [ 1369.076666] __x64_sys_ioctl+0x6f/0xb0 [ 1369.080533] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1369.085107] do_syscall_64+0xf9/0x620 [ 1369.088907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.094076] RIP: 0033:0x7fe175b41ec7 [ 1369.097770] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1369.116739] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1369.124437] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1369.131779] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1369.139029] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1369.146275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1369.153523] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001ffffffe40000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1369.180143] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1369.199491] BTRFS error (device loop5): open_ctree failed 21:25:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 17) 21:25:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1369.224569] BTRFS error (device loop5): superblock checksum mismatch [ 1369.243456] BTRFS error (device loop5): open_ctree failed [ 1369.270637] BTRFS error (device loop5): superblock checksum mismatch [ 1369.318304] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13777) [ 1369.333177] FAULT_INJECTION: forcing a failure. [ 1369.333177] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.344822] CPU: 1 PID: 13786 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1369.352713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.362063] Call Trace: [ 1369.364656] dump_stack+0x1fc/0x2ef [ 1369.368281] should_fail.cold+0xa/0xf [ 1369.372078] ? setup_fault_attr+0x200/0x200 [ 1369.376392] ? lock_acquire+0x170/0x3c0 [ 1369.380352] __should_failslab+0x115/0x180 [ 1369.384581] should_failslab+0x5/0x10 [ 1369.388374] kmem_cache_alloc+0x277/0x370 [ 1369.392522] __kernfs_new_node+0xd2/0x680 [ 1369.396670] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1369.401422] ? __mutex_unlock_slowpath+0xea/0x610 [ 1369.406256] ? wait_for_completion_io+0x10/0x10 [ 1369.410908] ? kernfs_next_descendant_post+0x19c/0x290 [ 1369.416170] kernfs_new_node+0x92/0x120 [ 1369.420144] __kernfs_create_file+0x51/0x340 [ 1369.424564] sysfs_add_file_mode_ns+0x226/0x540 [ 1369.429228] internal_create_group+0x355/0xb20 [ 1369.433809] ? sysfs_remove_link_from_group+0x70/0x70 [ 1369.438998] ? lock_downgrade+0x720/0x720 [ 1369.443148] lo_ioctl+0xf7c/0x20e0 [ 1369.446696] ? loop_set_status64+0x110/0x110 [ 1369.451101] blkdev_ioctl+0x5cb/0x1a80 [ 1369.454981] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.460331] ? blkpg_ioctl+0x9d0/0x9d0 [ 1369.464215] ? mark_held_locks+0xf0/0xf0 [ 1369.468267] ? mark_held_locks+0xf0/0xf0 [ 1369.472322] ? debug_check_no_obj_freed+0x201/0x490 [ 1369.477330] ? lock_downgrade+0x720/0x720 [ 1369.481469] block_ioctl+0xe9/0x130 [ 1369.485094] ? blkdev_fallocate+0x3f0/0x3f0 [ 1369.489414] do_vfs_ioctl+0xcdb/0x12e0 [ 1369.493299] ? lock_downgrade+0x720/0x720 [ 1369.497437] ? check_preemption_disabled+0x41/0x280 [ 1369.502446] ? ioctl_preallocate+0x200/0x200 [ 1369.506850] ? __fget+0x356/0x510 [ 1369.510287] ? do_dup2+0x450/0x450 [ 1369.513834] ? do_sys_open+0x2bf/0x520 [ 1369.517717] ksys_ioctl+0x9b/0xc0 [ 1369.521161] __x64_sys_ioctl+0x6f/0xb0 [ 1369.525055] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1369.529629] do_syscall_64+0xf9/0x620 [ 1369.533427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.538606] RIP: 0033:0x7fe175b41ec7 [ 1369.542309] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1369.561202] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:25:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1369.568903] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1369.576161] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1369.583418] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1369.590675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1369.597930] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1369.669163] BTRFS error (device loop5): open_ctree failed 21:25:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 18) [ 1369.859655] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (13801) [ 1369.876577] BTRFS error (device loop5): superblock checksum mismatch 21:25:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000290800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1369.905964] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13805) [ 1369.924765] FAULT_INJECTION: forcing a failure. [ 1369.924765] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.937528] CPU: 1 PID: 13821 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1369.945411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.954749] Call Trace: [ 1369.957340] dump_stack+0x1fc/0x2ef [ 1369.960962] should_fail.cold+0xa/0xf [ 1369.964757] ? setup_fault_attr+0x200/0x200 [ 1369.969078] ? lock_acquire+0x170/0x3c0 [ 1369.973065] __should_failslab+0x115/0x180 [ 1369.977292] should_failslab+0x5/0x10 [ 1369.981075] kmem_cache_alloc+0x277/0x370 [ 1369.985218] __kernfs_new_node+0xd2/0x680 [ 1369.989349] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1369.994101] ? __mutex_unlock_slowpath+0xea/0x610 [ 1369.998947] ? wait_for_completion_io+0x10/0x10 [ 1370.003614] ? kernfs_next_descendant_post+0x19c/0x290 [ 1370.008898] kernfs_new_node+0x92/0x120 [ 1370.012883] __kernfs_create_file+0x51/0x340 [ 1370.017288] sysfs_add_file_mode_ns+0x226/0x540 [ 1370.021956] internal_create_group+0x355/0xb20 [ 1370.026543] ? sysfs_remove_link_from_group+0x70/0x70 [ 1370.031721] ? lock_downgrade+0x720/0x720 [ 1370.035880] lo_ioctl+0xf7c/0x20e0 [ 1370.039414] ? loop_set_status64+0x110/0x110 [ 1370.043830] blkdev_ioctl+0x5cb/0x1a80 [ 1370.047726] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.053079] ? blkpg_ioctl+0x9d0/0x9d0 [ 1370.056955] ? mark_held_locks+0xf0/0xf0 [ 1370.060996] ? mark_held_locks+0xf0/0xf0 [ 1370.065040] ? debug_check_no_obj_freed+0x201/0x490 [ 1370.070042] ? lock_downgrade+0x720/0x720 [ 1370.074197] block_ioctl+0xe9/0x130 [ 1370.077824] ? blkdev_fallocate+0x3f0/0x3f0 [ 1370.082145] do_vfs_ioctl+0xcdb/0x12e0 [ 1370.086029] ? lock_downgrade+0x720/0x720 [ 1370.090157] ? check_preemption_disabled+0x41/0x280 [ 1370.095151] ? ioctl_preallocate+0x200/0x200 [ 1370.099573] ? __fget+0x356/0x510 [ 1370.103020] ? do_dup2+0x450/0x450 [ 1370.106559] ? do_sys_open+0x2bf/0x520 [ 1370.110438] ksys_ioctl+0x9b/0xc0 [ 1370.113881] __x64_sys_ioctl+0x6f/0xb0 [ 1370.117756] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1370.122326] do_syscall_64+0xf9/0x620 [ 1370.126119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.131285] RIP: 0033:0x7fe175b41ec7 [ 1370.134977] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1370.153864] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1370.161565] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1370.168823] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1370.176093] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1370.183361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1370.190629] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1370.249678] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) 21:25:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 19) [ 1370.299604] BTRFS error (device loop5): open_ctree failed [ 1370.313538] BTRFS error (device loop5): superblock checksum mismatch 21:25:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1370.351996] BTRFS error (device loop5): open_ctree failed [ 1370.359066] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13832) [ 1370.371311] BTRFS error (device loop5): superblock checksum mismatch 21:25:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1370.472026] BTRFS error (device loop5): open_ctree failed [ 1370.487929] FAULT_INJECTION: forcing a failure. [ 1370.487929] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.501037] CPU: 0 PID: 13842 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1370.508933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.518283] Call Trace: [ 1370.520870] dump_stack+0x1fc/0x2ef [ 1370.524481] should_fail.cold+0xa/0xf [ 1370.528266] ? setup_fault_attr+0x200/0x200 [ 1370.532583] ? lock_acquire+0x170/0x3c0 [ 1370.536548] __should_failslab+0x115/0x180 [ 1370.540767] should_failslab+0x5/0x10 [ 1370.544546] kmem_cache_alloc+0x277/0x370 [ 1370.548694] __kernfs_new_node+0xd2/0x680 [ 1370.552835] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1370.557577] ? __mutex_unlock_slowpath+0xea/0x610 [ 1370.562399] ? wait_for_completion_io+0x10/0x10 [ 1370.567050] ? kernfs_next_descendant_post+0x19c/0x290 [ 1370.572312] kernfs_new_node+0x92/0x120 [ 1370.576268] __kernfs_create_file+0x51/0x340 [ 1370.580659] sysfs_add_file_mode_ns+0x226/0x540 [ 1370.585319] internal_create_group+0x355/0xb20 [ 1370.589883] ? sysfs_remove_link_from_group+0x70/0x70 [ 1370.595059] ? lock_downgrade+0x720/0x720 [ 1370.599203] lo_ioctl+0xf7c/0x20e0 [ 1370.602740] ? loop_set_status64+0x110/0x110 [ 1370.607158] blkdev_ioctl+0x5cb/0x1a80 [ 1370.611043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.616390] ? blkpg_ioctl+0x9d0/0x9d0 [ 1370.620265] ? mark_held_locks+0xf0/0xf0 [ 1370.624310] ? mark_held_locks+0xf0/0xf0 [ 1370.628354] ? debug_check_no_obj_freed+0x201/0x490 [ 1370.633363] ? lock_downgrade+0x720/0x720 [ 1370.637492] block_ioctl+0xe9/0x130 [ 1370.641096] ? blkdev_fallocate+0x3f0/0x3f0 [ 1370.645397] do_vfs_ioctl+0xcdb/0x12e0 [ 1370.649264] ? lock_downgrade+0x720/0x720 [ 1370.653399] ? check_preemption_disabled+0x41/0x280 [ 1370.658406] ? ioctl_preallocate+0x200/0x200 [ 1370.662815] ? __fget+0x356/0x510 [ 1370.666258] ? do_dup2+0x450/0x450 [ 1370.669778] ? do_sys_open+0x2bf/0x520 [ 1370.673648] ksys_ioctl+0x9b/0xc0 [ 1370.677082] __x64_sys_ioctl+0x6f/0xb0 [ 1370.680951] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1370.685512] do_syscall_64+0xf9/0x620 [ 1370.689309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.694485] RIP: 0033:0x7fe175b41ec7 [ 1370.698187] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1370.717076] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1370.724761] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1370.732008] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1370.739256] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1370.746503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1370.753771] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 20) [ 1370.955606] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13857) [ 1370.955859] BTRFS error (device loop5): superblock checksum mismatch [ 1370.988173] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13858) 21:25:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000040000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1371.026688] FAULT_INJECTION: forcing a failure. [ 1371.026688] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.038919] CPU: 1 PID: 13881 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1371.046812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.056148] Call Trace: [ 1371.058719] dump_stack+0x1fc/0x2ef [ 1371.062348] should_fail.cold+0xa/0xf [ 1371.066230] ? setup_fault_attr+0x200/0x200 [ 1371.070533] ? lock_acquire+0x170/0x3c0 [ 1371.074506] __should_failslab+0x115/0x180 [ 1371.078740] should_failslab+0x5/0x10 [ 1371.082526] __kmalloc+0x2ab/0x3c0 [ 1371.086055] ? kobject_get_path+0xbf/0x240 [ 1371.090271] kobject_get_path+0xbf/0x240 [ 1371.094330] kobject_uevent_env+0x25c/0x1480 [ 1371.098742] lo_ioctl+0xff9/0x20e0 [ 1371.102280] ? loop_set_status64+0x110/0x110 [ 1371.106680] blkdev_ioctl+0x5cb/0x1a80 [ 1371.110549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.115894] ? blkpg_ioctl+0x9d0/0x9d0 [ 1371.119773] ? mark_held_locks+0xf0/0xf0 [ 1371.123839] ? mark_held_locks+0xf0/0xf0 [ 1371.127894] ? debug_check_no_obj_freed+0x201/0x490 [ 1371.132904] ? lock_downgrade+0x720/0x720 [ 1371.137048] block_ioctl+0xe9/0x130 [ 1371.140660] ? blkdev_fallocate+0x3f0/0x3f0 [ 1371.144962] do_vfs_ioctl+0xcdb/0x12e0 [ 1371.148831] ? lock_downgrade+0x720/0x720 [ 1371.152970] ? check_preemption_disabled+0x41/0x280 [ 1371.157975] ? ioctl_preallocate+0x200/0x200 [ 1371.162386] ? __fget+0x356/0x510 [ 1371.165836] ? do_dup2+0x450/0x450 [ 1371.169368] ? do_sys_open+0x2bf/0x520 [ 1371.173250] ksys_ioctl+0x9b/0xc0 [ 1371.176693] __x64_sys_ioctl+0x6f/0xb0 [ 1371.180566] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1371.185126] do_syscall_64+0xf9/0x620 [ 1371.188920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.194110] RIP: 0033:0x7fe175b41ec7 [ 1371.197829] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1371.216724] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1371.224423] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1371.231684] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1371.238937] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1371.246190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1371.253459] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001fffffff60000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1371.298749] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1371.337951] BTRFS error (device loop5): open_ctree failed 21:25:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 21) [ 1371.347427] BTRFS error (device loop5): superblock checksum mismatch 21:25:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1371.382350] BTRFS error (device loop5): open_ctree failed [ 1371.404585] BTRFS error (device loop5): superblock checksum mismatch [ 1371.448376] FAULT_INJECTION: forcing a failure. [ 1371.448376] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.459959] CPU: 1 PID: 13900 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1371.467844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.477195] Call Trace: [ 1371.479770] dump_stack+0x1fc/0x2ef [ 1371.483382] should_fail.cold+0xa/0xf [ 1371.487165] ? setup_fault_attr+0x200/0x200 [ 1371.491479] ? lock_acquire+0x170/0x3c0 [ 1371.495445] __should_failslab+0x115/0x180 [ 1371.499665] should_failslab+0x5/0x10 [ 1371.503446] __kmalloc+0x2ab/0x3c0 [ 1371.506978] ? kobject_get_path+0xbf/0x240 [ 1371.511219] kobject_get_path+0xbf/0x240 [ 1371.515294] kobject_uevent_env+0x25c/0x1480 [ 1371.519724] lo_ioctl+0xff9/0x20e0 [ 1371.523265] ? loop_set_status64+0x110/0x110 [ 1371.527679] blkdev_ioctl+0x5cb/0x1a80 [ 1371.531556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.536911] ? blkpg_ioctl+0x9d0/0x9d0 [ 1371.540781] ? mark_held_locks+0xf0/0xf0 [ 1371.544826] ? mark_held_locks+0xf0/0xf0 [ 1371.548871] ? debug_check_no_obj_freed+0x201/0x490 [ 1371.553882] ? lock_downgrade+0x720/0x720 [ 1371.558022] block_ioctl+0xe9/0x130 [ 1371.561627] ? blkdev_fallocate+0x3f0/0x3f0 [ 1371.566020] do_vfs_ioctl+0xcdb/0x12e0 [ 1371.569894] ? lock_downgrade+0x720/0x720 [ 1371.574036] ? check_preemption_disabled+0x41/0x280 [ 1371.579055] ? ioctl_preallocate+0x200/0x200 [ 1371.583470] ? __fget+0x356/0x510 [ 1371.586926] ? do_dup2+0x450/0x450 [ 1371.590456] ? do_sys_open+0x2bf/0x520 [ 1371.594352] ksys_ioctl+0x9b/0xc0 [ 1371.597798] __x64_sys_ioctl+0x6f/0xb0 [ 1371.601668] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1371.606237] do_syscall_64+0xf9/0x620 [ 1371.610029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.615217] RIP: 0033:0x7fe175b41ec7 [ 1371.618920] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1371.637801] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:25:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1371.645543] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1371.652800] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1371.660059] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1371.667309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1371.674566] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 [ 1371.692515] BTRFS error (device loop5): open_ctree failed 21:25:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1371.749708] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13898) [ 1371.783024] BTRFS error (device loop5): superblock checksum mismatch 21:25:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000070000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 22) 21:25:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1371.864827] BTRFS error (device loop5): open_ctree failed [ 1371.954732] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1371.966959] BTRFS info (device loop0): disk space caching is enabled 21:25:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1372.027056] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13927) [ 1372.046855] BTRFS info (device loop0): has skinny extents [ 1372.126019] FAULT_INJECTION: forcing a failure. [ 1372.126019] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.137479] CPU: 0 PID: 13954 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1372.145361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.154703] Call Trace: [ 1372.157283] dump_stack+0x1fc/0x2ef [ 1372.160900] should_fail.cold+0xa/0xf [ 1372.164682] ? setup_fault_attr+0x200/0x200 [ 1372.168983] ? lock_acquire+0x170/0x3c0 [ 1372.172943] __should_failslab+0x115/0x180 [ 1372.177172] should_failslab+0x5/0x10 [ 1372.180966] kmem_cache_alloc_node+0x245/0x3b0 [ 1372.185543] __alloc_skb+0x71/0x560 [ 1372.189157] alloc_uevent_skb+0x7b/0x210 [ 1372.193202] kobject_uevent_env+0xa90/0x1480 [ 1372.197600] lo_ioctl+0xff9/0x20e0 [ 1372.201126] ? loop_set_status64+0x110/0x110 [ 1372.205515] blkdev_ioctl+0x5cb/0x1a80 [ 1372.209399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1372.214749] ? blkpg_ioctl+0x9d0/0x9d0 [ 1372.218621] ? mark_held_locks+0xf0/0xf0 [ 1372.222666] ? mark_held_locks+0xf0/0xf0 [ 1372.226715] ? debug_check_no_obj_freed+0x201/0x490 [ 1372.231715] ? lock_downgrade+0x720/0x720 [ 1372.235846] block_ioctl+0xe9/0x130 [ 1372.239450] ? blkdev_fallocate+0x3f0/0x3f0 [ 1372.243752] do_vfs_ioctl+0xcdb/0x12e0 [ 1372.247620] ? lock_downgrade+0x720/0x720 [ 1372.251749] ? check_preemption_disabled+0x41/0x280 [ 1372.256745] ? ioctl_preallocate+0x200/0x200 [ 1372.261140] ? __fget+0x356/0x510 [ 1372.264577] ? do_dup2+0x450/0x450 [ 1372.268099] ? do_sys_open+0x2bf/0x520 [ 1372.271981] ksys_ioctl+0x9b/0xc0 [ 1372.275427] __x64_sys_ioctl+0x6f/0xb0 [ 1372.279296] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1372.283858] do_syscall_64+0xf9/0x620 [ 1372.287642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1372.292809] RIP: 0033:0x7fe175b41ec7 [ 1372.296503] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1372.315383] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1372.323075] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1372.330325] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1372.337576] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1372.344824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1372.352075] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 [ 1372.383489] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1372.383582] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13951) [ 1372.401405] BTRFS warning (device loop0): failed to read tree root 21:25:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 23) 21:25:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1372.448643] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1372.557865] FAULT_INJECTION: forcing a failure. [ 1372.557865] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.569297] CPU: 1 PID: 13980 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1372.577174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.586596] Call Trace: [ 1372.589176] dump_stack+0x1fc/0x2ef [ 1372.592803] should_fail.cold+0xa/0xf [ 1372.596608] ? setup_fault_attr+0x200/0x200 [ 1372.600930] ? lock_acquire+0x170/0x3c0 [ 1372.604899] __should_failslab+0x115/0x180 [ 1372.609121] should_failslab+0x5/0x10 [ 1372.612910] kmem_cache_alloc+0x277/0x370 [ 1372.617057] skb_clone+0x151/0x3d0 [ 1372.620602] netlink_broadcast_filtered+0x8e5/0xbc0 [ 1372.625615] netlink_broadcast+0x35/0x40 [ 1372.629664] kobject_uevent_env+0xa56/0x1480 [ 1372.634062] lo_ioctl+0xff9/0x20e0 [ 1372.637596] ? loop_set_status64+0x110/0x110 [ 1372.642007] blkdev_ioctl+0x5cb/0x1a80 [ 1372.645885] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1372.651228] ? blkpg_ioctl+0x9d0/0x9d0 [ 1372.655096] ? mark_held_locks+0xf0/0xf0 [ 1372.659143] ? mark_held_locks+0xf0/0xf0 [ 1372.663196] ? debug_check_no_obj_freed+0x201/0x490 [ 1372.668203] ? lock_downgrade+0x720/0x720 [ 1372.672343] block_ioctl+0xe9/0x130 [ 1372.675957] ? blkdev_fallocate+0x3f0/0x3f0 [ 1372.680259] do_vfs_ioctl+0xcdb/0x12e0 [ 1372.684138] ? lock_downgrade+0x720/0x720 [ 1372.688279] ? check_preemption_disabled+0x41/0x280 [ 1372.693286] ? ioctl_preallocate+0x200/0x200 [ 1372.697685] ? __fget+0x356/0x510 [ 1372.701127] ? do_dup2+0x450/0x450 [ 1372.704651] ? do_sys_open+0x2bf/0x520 [ 1372.708527] ksys_ioctl+0x9b/0xc0 [ 1372.711977] __x64_sys_ioctl+0x6f/0xb0 [ 1372.715854] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1372.720425] do_syscall_64+0xf9/0x620 [ 1372.724227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1372.729405] RIP: 0033:0x7fe175b41ec7 [ 1372.733110] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1372.752002] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1372.759701] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1372.766952] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1372.774201] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1372.781450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1372.788701] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1372.814121] BTRFS error (device loop0): open_ctree failed [ 1372.823305] BTRFS info (device loop0): disabling disk space caching [ 1372.840132] BTRFS info (device loop0): has skinny extents [ 1372.852249] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (13981) 21:25:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1372.972526] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (13983) [ 1373.012040] BTRFS error (device loop0): open_ctree failed 21:25:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1373.027311] BTRFS info (device loop0): disabling disk space caching [ 1373.037016] BTRFS info (device loop0): has skinny extents [ 1373.065743] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 24) 21:25:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1373.182785] BTRFS error (device loop0): open_ctree failed [ 1373.239684] BTRFS error (device loop1): superblock checksum mismatch [ 1373.247238] FAULT_INJECTION: forcing a failure. [ 1373.247238] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.258596] CPU: 1 PID: 14054 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1373.266473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.275910] Call Trace: [ 1373.278488] dump_stack+0x1fc/0x2ef [ 1373.282111] should_fail.cold+0xa/0xf [ 1373.285910] ? setup_fault_attr+0x200/0x200 [ 1373.290228] ? lock_acquire+0x170/0x3c0 [ 1373.294209] __should_failslab+0x115/0x180 [ 1373.298451] should_failslab+0x5/0x10 [ 1373.302245] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1373.307341] __kmalloc_node_track_caller+0x38/0x70 [ 1373.312269] __alloc_skb+0xae/0x560 [ 1373.315909] alloc_uevent_skb+0x7b/0x210 [ 1373.319959] kobject_uevent_env+0xa90/0x1480 [ 1373.324358] lo_ioctl+0xff9/0x20e0 [ 1373.327881] ? loop_set_status64+0x110/0x110 [ 1373.332285] blkdev_ioctl+0x5cb/0x1a80 [ 1373.336174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.341534] ? blkpg_ioctl+0x9d0/0x9d0 [ 1373.345413] ? mark_held_locks+0xf0/0xf0 [ 1373.349456] ? mark_held_locks+0xf0/0xf0 [ 1373.353522] ? debug_check_no_obj_freed+0x201/0x490 [ 1373.358554] ? lock_downgrade+0x720/0x720 [ 1373.362703] block_ioctl+0xe9/0x130 [ 1373.366332] ? blkdev_fallocate+0x3f0/0x3f0 [ 1373.370656] do_vfs_ioctl+0xcdb/0x12e0 [ 1373.374554] ? lock_downgrade+0x720/0x720 [ 1373.378704] ? check_preemption_disabled+0x41/0x280 [ 1373.383721] ? ioctl_preallocate+0x200/0x200 [ 1373.388121] ? __fget+0x356/0x510 [ 1373.391566] ? do_dup2+0x450/0x450 [ 1373.395096] ? do_sys_open+0x2bf/0x520 [ 1373.398965] ksys_ioctl+0x9b/0xc0 [ 1373.402411] __x64_sys_ioctl+0x6f/0xb0 [ 1373.406290] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1373.410865] do_syscall_64+0xf9/0x620 [ 1373.414662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.419843] RIP: 0033:0x7fe175b41ec7 [ 1373.423552] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1373.442451] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1373.450149] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1373.457406] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1373.464671] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1373.471936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1373.479196] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000090000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1373.553231] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14052) 21:25:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 25) [ 1373.615573] BTRFS error (device loop1): open_ctree failed [ 1373.626349] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1373.649834] BTRFS info (device loop0): disk space caching is enabled [ 1373.658414] BTRFS info (device loop0): has skinny extents [ 1373.772211] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1373.781059] BTRFS warning (device loop0): failed to read tree root [ 1373.784032] FAULT_INJECTION: forcing a failure. [ 1373.784032] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.799569] CPU: 1 PID: 14105 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1373.807454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.816794] Call Trace: [ 1373.819365] dump_stack+0x1fc/0x2ef [ 1373.822980] should_fail.cold+0xa/0xf [ 1373.826768] ? setup_fault_attr+0x200/0x200 [ 1373.831069] ? lock_acquire+0x170/0x3c0 [ 1373.835035] __should_failslab+0x115/0x180 [ 1373.839261] should_failslab+0x5/0x10 [ 1373.843043] kmem_cache_alloc_trace+0x284/0x380 [ 1373.847692] ? wait_for_completion_io+0x10/0x10 [ 1373.852340] ? kobj_ns_initial+0x90/0x90 [ 1373.856383] call_usermodehelper_setup+0x84/0x300 [ 1373.861206] kobject_uevent_env+0xe83/0x1480 [ 1373.865604] lo_ioctl+0xff9/0x20e0 [ 1373.869127] ? loop_set_status64+0x110/0x110 [ 1373.873526] blkdev_ioctl+0x5cb/0x1a80 [ 1373.877403] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.882746] ? blkpg_ioctl+0x9d0/0x9d0 [ 1373.886612] ? mark_held_locks+0xf0/0xf0 [ 1373.890659] ? mark_held_locks+0xf0/0xf0 [ 1373.894710] ? debug_check_no_obj_freed+0x201/0x490 [ 1373.899707] ? lock_downgrade+0x720/0x720 [ 1373.903838] block_ioctl+0xe9/0x130 [ 1373.907443] ? blkdev_fallocate+0x3f0/0x3f0 [ 1373.911746] do_vfs_ioctl+0xcdb/0x12e0 [ 1373.915624] ? lock_downgrade+0x720/0x720 [ 1373.919755] ? check_preemption_disabled+0x41/0x280 [ 1373.924750] ? ioctl_preallocate+0x200/0x200 [ 1373.929138] ? __fget+0x356/0x510 [ 1373.932575] ? do_dup2+0x450/0x450 [ 1373.936097] ? do_sys_open+0x2bf/0x520 [ 1373.939964] ksys_ioctl+0x9b/0xc0 [ 1373.943398] __x64_sys_ioctl+0x6f/0xb0 [ 1373.947266] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1373.951828] do_syscall_64+0xf9/0x620 [ 1373.955609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.960777] RIP: 0033:0x7fe175b41ec7 [ 1373.964469] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1373.983348] RSP: 002b:00007fe1744b6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1373.991119] RAX: ffffffffffffffda RBX: 00007fe175b8ba20 RCX: 00007fe175b41ec7 [ 1373.998370] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1374.005620] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1374.012869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 21:25:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1374.020120] R13: 0000000000000004 R14: 00000000200009d8 R15: 0000000000000001 21:25:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000090000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1374.161798] BTRFS error (device loop0): open_ctree failed 21:25:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 26) 21:25:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1374.237107] BTRFS error (device loop1): superblock checksum mismatch [ 1374.278478] BTRFS error (device loop1): open_ctree failed 21:25:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1374.336493] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 [ 1374.392374] BTRFS error (device loop5): superblock checksum mismatch [ 1374.453822] FAULT_INJECTION: forcing a failure. [ 1374.453822] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.459221] BTRFS error (device loop5): open_ctree failed [ 1374.466789] CPU: 0 PID: 14149 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1374.476836] BTRFS error (device loop5): superblock checksum mismatch [ 1374.478577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.494390] Call Trace: [ 1374.496988] dump_stack+0x1fc/0x2ef [ 1374.500620] should_fail.cold+0xa/0xf [ 1374.504426] ? setup_fault_attr+0x200/0x200 [ 1374.508746] ? lock_acquire+0x170/0x3c0 [ 1374.512725] __should_failslab+0x115/0x180 [ 1374.516964] should_failslab+0x5/0x10 [ 1374.520766] kmem_cache_alloc+0x277/0x370 [ 1374.524917] getname_flags+0xce/0x590 [ 1374.528719] do_mkdirat+0x8d/0x2d0 [ 1374.532262] ? __ia32_sys_mknod+0x120/0x120 [ 1374.536584] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1374.541947] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1374.546970] ? do_syscall_64+0x21/0x620 [ 1374.550951] do_syscall_64+0xf9/0x620 [ 1374.554763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.559946] RIP: 0033:0x7fe175b41217 [ 1374.563659] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1374.582554] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1374.590257] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 [ 1374.597523] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1374.604791] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1374.612059] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1374.619323] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1374.639697] BTRFS error (device loop5): open_ctree failed 21:25:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 27) 21:25:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1374.652937] BTRFS error (device loop5): superblock checksum mismatch [ 1374.659659] BTRFS error (device loop5): open_ctree failed [ 1374.678863] BTRFS error (device loop5): superblock checksum mismatch [ 1374.846543] BTRFS error (device loop5): open_ctree failed [ 1374.869066] FAULT_INJECTION: forcing a failure. [ 1374.869066] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1374.880885] CPU: 0 PID: 14183 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1374.882734] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop4 [ 1374.888757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.888763] Call Trace: [ 1374.888786] dump_stack+0x1fc/0x2ef [ 1374.888810] should_fail.cold+0xa/0xf [ 1374.917048] ? setup_fault_attr+0x200/0x200 [ 1374.921374] ? wake_up_q+0x93/0xe0 [ 1374.924922] ? __mutex_unlock_slowpath+0x2be/0x610 [ 1374.929862] __alloc_pages_nodemask+0x239/0x2890 [ 1374.934632] ? __lock_acquire+0x6de/0x3ff0 [ 1374.938881] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1374.943730] ? blkdev_ioctl+0x11a/0x1a80 [ 1374.947800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.953167] ? blkpg_ioctl+0x9d0/0x9d0 [ 1374.957060] ? debug_check_no_obj_freed+0x201/0x490 [ 1374.962068] ? lock_downgrade+0x720/0x720 [ 1374.966205] cache_grow_begin+0xa4/0x8a0 [ 1374.970255] ? setup_fault_attr+0x200/0x200 [ 1374.974563] ? lock_acquire+0x170/0x3c0 [ 1374.978528] cache_alloc_refill+0x273/0x340 [ 1374.982837] kmem_cache_alloc+0x346/0x370 [ 1374.986974] getname_flags+0xce/0x590 [ 1374.990763] do_mkdirat+0x8d/0x2d0 [ 1374.994291] ? __ia32_sys_mknod+0x120/0x120 [ 1374.998601] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1375.003950] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1375.008952] ? do_syscall_64+0x21/0x620 [ 1375.012922] do_syscall_64+0xf9/0x620 [ 1375.016720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.021895] RIP: 0033:0x7fe175b41217 [ 1375.025599] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 21:25:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1375.044490] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1375.052181] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 [ 1375.059434] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1375.066689] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1375.074028] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1375.081286] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 28) 21:25:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1375.148983] BTRFS error (device loop4): superblock checksum mismatch 21:25:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1375.216220] BTRFS error (device loop4): open_ctree failed [ 1375.224678] BTRFS error (device loop4): superblock checksum mismatch [ 1375.233413] BTRFS error (device loop4): open_ctree failed [ 1375.246846] BTRFS error (device loop4): superblock checksum mismatch [ 1375.260552] BTRFS error (device loop4): open_ctree failed [ 1375.269956] BTRFS error (device loop4): superblock checksum mismatch 21:25:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1375.312328] BTRFS error (device loop4): open_ctree failed [ 1375.394650] FAULT_INJECTION: forcing a failure. [ 1375.394650] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.416383] CPU: 0 PID: 14223 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1375.424287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1375.433645] Call Trace: [ 1375.436239] dump_stack+0x1fc/0x2ef [ 1375.439872] should_fail.cold+0xa/0xf [ 1375.443677] ? setup_fault_attr+0x200/0x200 [ 1375.448009] __should_failslab+0x115/0x180 [ 1375.452248] should_failslab+0x5/0x10 [ 1375.456049] kmem_cache_alloc+0x277/0x370 [ 1375.460198] ? ext4_sync_fs+0x8d0/0x8d0 [ 1375.464172] ext4_alloc_inode+0x1a/0x630 [ 1375.468237] ? ext4_sync_fs+0x8d0/0x8d0 [ 1375.472212] alloc_inode+0x5d/0x180 [ 1375.475847] new_inode+0x1d/0xf0 [ 1375.479216] __ext4_new_inode+0x400/0x5a20 [ 1375.483454] ? putname+0xe1/0x120 [ 1375.486904] ? do_mkdirat+0xa0/0x2d0 [ 1375.490626] ? ext4_free_inode+0x1780/0x1780 [ 1375.495032] ? debug_check_no_obj_freed+0x201/0x490 [ 1375.500044] ? __dquot_initialize+0x298/0xb70 [ 1375.504544] ? lock_acquire+0x170/0x3c0 [ 1375.508521] ? dquot_initialize_needed+0x290/0x290 [ 1375.513451] ? trace_hardirqs_off+0x64/0x200 [ 1375.517860] ? common_perm+0x4be/0x800 [ 1375.521748] ext4_mkdir+0x396/0xe10 [ 1375.525382] ? putname+0xe1/0x120 [ 1375.528842] ? ext4_init_dot_dotdot+0x600/0x600 [ 1375.533516] ? generic_permission+0x116/0x4d0 [ 1375.538010] ? security_inode_permission+0xc5/0xf0 [ 1375.542943] ? inode_permission.part.0+0x10c/0x450 [ 1375.547875] vfs_mkdir+0x508/0x7a0 [ 1375.551419] do_mkdirat+0x262/0x2d0 [ 1375.555048] ? __ia32_sys_mknod+0x120/0x120 [ 1375.559372] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1375.564393] ? do_syscall_64+0x21/0x620 [ 1375.568373] do_syscall_64+0xf9/0x620 [ 1375.572182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.577369] RIP: 0033:0x7fe175b41217 [ 1375.581078] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1375.599968] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1375.607659] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 [ 1375.614907] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1375.622151] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1375.629403] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1375.636663] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 29) [ 1375.649749] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (14229) [ 1375.675080] BTRFS error (device loop4): superblock checksum mismatch 21:25:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1375.712252] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14238) [ 1375.747672] FAULT_INJECTION: forcing a failure. [ 1375.747672] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.767940] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1375.768741] CPU: 0 PID: 14252 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1375.787350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1375.796695] Call Trace: [ 1375.798347] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1375.799284] dump_stack+0x1fc/0x2ef [ 1375.799304] should_fail.cold+0xa/0xf [ 1375.818206] ? setup_fault_attr+0x200/0x200 [ 1375.822512] ? __lock_acquire+0x6de/0x3ff0 [ 1375.826735] __should_failslab+0x115/0x180 [ 1375.830959] should_failslab+0x5/0x10 [ 1375.834741] __kmalloc+0x2ab/0x3c0 [ 1375.838265] ? ext4_find_extent+0x9bb/0xc70 [ 1375.842571] ext4_find_extent+0x9bb/0xc70 [ 1375.846705] ext4_ext_map_blocks+0x1c0/0x7390 [ 1375.851184] ? __lock_acquire+0x6de/0x3ff0 [ 1375.855405] ? __lock_acquire+0x6de/0x3ff0 [ 1375.859625] ? mark_held_locks+0xf0/0xf0 [ 1375.863668] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1375.869012] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1375.874189] ? mark_held_locks+0xf0/0xf0 [ 1375.878236] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1375.883069] ? ext4_es_lookup_extent+0x375/0xb60 [ 1375.887811] ? lock_downgrade+0x720/0x720 [ 1375.891940] ? lock_acquire+0x170/0x3c0 [ 1375.895898] ? check_preemption_disabled+0x41/0x280 [ 1375.900898] ? lock_acquire+0x170/0x3c0 [ 1375.904855] ? ext4_map_blocks+0x33e/0x1a50 [ 1375.909172] ext4_map_blocks+0xd88/0x1a50 [ 1375.913307] ? check_preemption_disabled+0x41/0x280 [ 1375.918308] ? ext4_issue_zeroout+0x160/0x160 [ 1375.922788] ? __brelse+0x84/0xa0 [ 1375.926222] ? __ext4_new_inode+0x2eb/0x5a20 [ 1375.930618] ext4_getblk+0xad/0x4f0 [ 1375.934231] ? ext4_iomap_begin+0xe00/0xe00 [ 1375.938535] ? ext4_free_inode+0x1780/0x1780 [ 1375.942923] ? debug_check_no_obj_freed+0x201/0x490 [ 1375.947920] ? __dquot_initialize+0x298/0xb70 [ 1375.952399] ext4_bread+0x7c/0x210 [ 1375.955920] ? ext4_getblk+0x4f0/0x4f0 [ 1375.959790] ? dquot_initialize_needed+0x290/0x290 [ 1375.964702] ? trace_hardirqs_off+0x64/0x200 [ 1375.969097] ext4_append+0x155/0x370 [ 1375.972803] ext4_mkdir+0x5bd/0xe10 [ 1375.976419] ? ext4_init_dot_dotdot+0x600/0x600 [ 1375.981075] ? generic_permission+0x116/0x4d0 [ 1375.985556] ? inode_permission.part.0+0x10c/0x450 [ 1375.990470] vfs_mkdir+0x508/0x7a0 [ 1375.993993] do_mkdirat+0x262/0x2d0 [ 1375.997607] ? __ia32_sys_mknod+0x120/0x120 [ 1376.001911] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1376.006911] ? do_syscall_64+0x21/0x620 [ 1376.010870] do_syscall_64+0xf9/0x620 [ 1376.014656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.019826] RIP: 0033:0x7fe175b41217 [ 1376.023522] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1376.042401] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1376.050089] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 [ 1376.057337] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c 21:25:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1376.064587] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1376.071835] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1376.079084] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1376.101917] BTRFS error (device loop4): open_ctree failed 21:25:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100c0ffff0000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1376.114345] BTRFS error (device loop4): superblock checksum mismatch [ 1376.125841] BTRFS error (device loop4): open_ctree failed [ 1376.154637] BTRFS error (device loop4): superblock checksum mismatch 21:25:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1376.166334] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14265) 21:25:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1376.279411] BTRFS error (device loop4): open_ctree failed 21:25:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 30) 21:25:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1376.448696] FAULT_INJECTION: forcing a failure. [ 1376.448696] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.460666] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14296) [ 1376.480945] BTRFS info (device loop0): disk space caching is enabled [ 1376.489401] CPU: 1 PID: 14299 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1376.496275] BTRFS info (device loop0): has skinny extents [ 1376.497291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.497296] Call Trace: [ 1376.497315] dump_stack+0x1fc/0x2ef [ 1376.497335] should_fail.cold+0xa/0xf [ 1376.497351] ? setup_fault_attr+0x200/0x200 [ 1376.497367] ? __lock_acquire+0x6de/0x3ff0 [ 1376.530684] __should_failslab+0x115/0x180 [ 1376.534908] should_failslab+0x5/0x10 [ 1376.538691] __kmalloc+0x2ab/0x3c0 [ 1376.542218] ? ext4_find_extent+0x9bb/0xc70 [ 1376.546536] ext4_find_extent+0x9bb/0xc70 [ 1376.550665] ext4_ext_map_blocks+0x1c0/0x7390 [ 1376.555141] ? __lock_acquire+0x6de/0x3ff0 [ 1376.559356] ? __lock_acquire+0x6de/0x3ff0 [ 1376.563579] ? mark_held_locks+0xf0/0xf0 [ 1376.567619] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1376.572968] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1376.578144] ? mark_held_locks+0xf0/0xf0 [ 1376.582197] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1376.587036] ? ext4_es_lookup_extent+0x375/0xb60 [ 1376.591783] ? lock_downgrade+0x720/0x720 [ 1376.595920] ? lock_acquire+0x170/0x3c0 [ 1376.599875] ? check_preemption_disabled+0x41/0x280 [ 1376.604873] ? lock_acquire+0x170/0x3c0 [ 1376.608827] ? ext4_map_blocks+0x33e/0x1a50 [ 1376.613146] ext4_map_blocks+0xd88/0x1a50 [ 1376.617285] ? check_preemption_disabled+0x41/0x280 [ 1376.622305] ? ext4_issue_zeroout+0x160/0x160 [ 1376.626803] ? __brelse+0x84/0xa0 [ 1376.630237] ? __ext4_new_inode+0x2eb/0x5a20 [ 1376.634628] ext4_getblk+0xad/0x4f0 [ 1376.638253] ? ext4_iomap_begin+0xe00/0xe00 [ 1376.642574] ? ext4_free_inode+0x1780/0x1780 [ 1376.646974] ? debug_check_no_obj_freed+0x201/0x490 [ 1376.651979] ? __dquot_initialize+0x298/0xb70 [ 1376.656462] ext4_bread+0x7c/0x210 [ 1376.659979] ? ext4_getblk+0x4f0/0x4f0 [ 1376.663849] ? dquot_initialize_needed+0x290/0x290 [ 1376.668757] ? trace_hardirqs_off+0x64/0x200 [ 1376.673187] ext4_append+0x155/0x370 [ 1376.676888] ext4_mkdir+0x5bd/0xe10 [ 1376.680509] ? ext4_init_dot_dotdot+0x600/0x600 [ 1376.685160] ? generic_permission+0x116/0x4d0 [ 1376.689647] ? inode_permission.part.0+0x10c/0x450 [ 1376.694580] vfs_mkdir+0x508/0x7a0 [ 1376.698106] do_mkdirat+0x262/0x2d0 [ 1376.701722] ? __ia32_sys_mknod+0x120/0x120 [ 1376.706042] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1376.711044] ? do_syscall_64+0x21/0x620 [ 1376.715001] do_syscall_64+0xf9/0x620 [ 1376.718785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.723952] RIP: 0033:0x7fe175b41217 [ 1376.727642] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 21:25:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1376.746521] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1376.754216] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 [ 1376.761481] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1376.768736] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1376.775983] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1376.783232] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1376.833815] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1376.852036] BTRFS warning (device loop0): failed to read tree root [ 1376.872060] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14314) [ 1376.898836] BTRFS error (device loop0): open_ctree failed [ 1376.901087] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1376.935276] BTRFS info (device loop0): disabling disk space caching 21:25:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 31) 21:25:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1376.942353] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14343) [ 1376.958448] BTRFS info (device loop0): has skinny extents [ 1376.992114] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1377.000705] BTRFS warning (device loop0): failed to read tree root [ 1377.011026] BTRFS error (device loop0): open_ctree failed [ 1377.018499] BTRFS info (device loop0): disabling disk space caching [ 1377.025086] BTRFS info (device loop0): has skinny extents [ 1377.038622] BTRFS error (device loop0): bad tree block start, want 5242880 have 0 [ 1377.049525] BTRFS warning (device loop0): failed to read tree root [ 1377.067007] FAULT_INJECTION: forcing a failure. [ 1377.067007] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.078437] CPU: 1 PID: 14355 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1377.086311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.095653] Call Trace: [ 1377.098229] dump_stack+0x1fc/0x2ef [ 1377.101851] should_fail.cold+0xa/0xf [ 1377.105640] ? setup_fault_attr+0x200/0x200 [ 1377.109946] ? __es_tree_search.isra.0+0x1af/0x210 [ 1377.114862] __should_failslab+0x115/0x180 [ 1377.119082] should_failslab+0x5/0x10 [ 1377.122864] kmem_cache_alloc+0x3f/0x370 [ 1377.126909] __es_insert_extent+0x39b/0x13b0 [ 1377.131302] ? lock_acquire+0x170/0x3c0 [ 1377.135257] ? ext4_es_insert_extent+0x17e/0x5e0 [ 1377.140000] ext4_es_insert_extent+0x22e/0x5e0 [ 1377.144568] ? lock_downgrade+0x720/0x720 [ 1377.148699] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1377.154481] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1377.159479] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 1377.165261] ext4_ext_map_blocks+0x2129/0x7390 [ 1377.169826] ? __lock_acquire+0x6de/0x3ff0 [ 1377.174046] ? __lock_acquire+0x6de/0x3ff0 [ 1377.178269] ? mark_held_locks+0xf0/0xf0 [ 1377.182310] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1377.187656] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1377.192825] ? mark_held_locks+0xf0/0xf0 [ 1377.196869] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1377.201713] ? ext4_es_lookup_extent+0x375/0xb60 [ 1377.206475] ? check_preemption_disabled+0x41/0x280 [ 1377.211489] ? lock_acquire+0x170/0x3c0 [ 1377.215450] ? ext4_map_blocks+0x33e/0x1a50 [ 1377.219765] ext4_map_blocks+0xd88/0x1a50 [ 1377.223909] ? check_preemption_disabled+0x41/0x280 [ 1377.228921] ? ext4_issue_zeroout+0x160/0x160 [ 1377.233405] ? __brelse+0x84/0xa0 [ 1377.236846] ? __ext4_new_inode+0x2eb/0x5a20 [ 1377.241247] ext4_getblk+0xad/0x4f0 [ 1377.244862] ? ext4_iomap_begin+0xe00/0xe00 [ 1377.249176] ? ext4_free_inode+0x1780/0x1780 [ 1377.253571] ? debug_check_no_obj_freed+0x201/0x490 [ 1377.258574] ? __dquot_initialize+0x298/0xb70 [ 1377.263059] ext4_bread+0x7c/0x210 [ 1377.266587] ? ext4_getblk+0x4f0/0x4f0 [ 1377.270462] ? dquot_initialize_needed+0x290/0x290 [ 1377.275378] ? trace_hardirqs_off+0x64/0x200 [ 1377.279777] ext4_append+0x155/0x370 [ 1377.283481] ext4_mkdir+0x5bd/0xe10 [ 1377.287099] ? ext4_init_dot_dotdot+0x600/0x600 [ 1377.291758] ? generic_permission+0x116/0x4d0 [ 1377.296241] ? inode_permission.part.0+0x10c/0x450 [ 1377.301156] vfs_mkdir+0x508/0x7a0 [ 1377.304690] do_mkdirat+0x262/0x2d0 [ 1377.308303] ? __ia32_sys_mknod+0x120/0x120 [ 1377.312613] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1377.317618] ? do_syscall_64+0x21/0x620 [ 1377.321581] do_syscall_64+0xf9/0x620 [ 1377.325375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1377.330554] RIP: 0033:0x7fe175b41217 [ 1377.334255] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1377.353136] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1377.360825] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 [ 1377.368076] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1377.375331] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1377.382584] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 21:25:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1377.389836] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1377.409477] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14359) 21:25:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000f00000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 32) 21:25:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000370800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1377.526028] BTRFS error (device loop0): open_ctree failed [ 1377.726845] FAULT_INJECTION: forcing a failure. [ 1377.726845] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.738232] CPU: 0 PID: 14420 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1377.746118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.755470] Call Trace: [ 1377.758057] dump_stack+0x1fc/0x2ef [ 1377.761692] should_fail.cold+0xa/0xf [ 1377.765486] ? setup_fault_attr+0x200/0x200 [ 1377.769795] ? __es_tree_search.isra.0+0x1af/0x210 [ 1377.774720] __should_failslab+0x115/0x180 [ 1377.778942] should_failslab+0x5/0x10 [ 1377.782727] kmem_cache_alloc+0x3f/0x370 [ 1377.786778] __es_insert_extent+0x39b/0x13b0 [ 1377.791173] ? lock_acquire+0x170/0x3c0 [ 1377.795132] ? ext4_es_insert_extent+0x17e/0x5e0 [ 1377.799879] ext4_es_insert_extent+0x22e/0x5e0 [ 1377.804450] ? lock_downgrade+0x720/0x720 [ 1377.808587] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1377.814372] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1377.819371] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 1377.825157] ext4_ext_map_blocks+0x2129/0x7390 [ 1377.829728] ? __lock_acquire+0x6de/0x3ff0 [ 1377.833960] ? __lock_acquire+0x6de/0x3ff0 [ 1377.838184] ? mark_held_locks+0xf0/0xf0 [ 1377.842229] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1377.847578] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1377.852756] ? mark_held_locks+0xf0/0xf0 [ 1377.856804] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1377.861634] ? ext4_es_lookup_extent+0x375/0xb60 [ 1377.866383] ? check_preemption_disabled+0x41/0x280 [ 1377.871389] ? lock_acquire+0x170/0x3c0 [ 1377.875346] ? ext4_map_blocks+0x33e/0x1a50 [ 1377.879660] ext4_map_blocks+0xd88/0x1a50 [ 1377.883796] ? check_preemption_disabled+0x41/0x280 [ 1377.888801] ? ext4_issue_zeroout+0x160/0x160 [ 1377.893282] ? __brelse+0x84/0xa0 [ 1377.896718] ? __ext4_new_inode+0x2eb/0x5a20 [ 1377.901118] ext4_getblk+0xad/0x4f0 [ 1377.904737] ? ext4_iomap_begin+0xe00/0xe00 [ 1377.909051] ? ext4_free_inode+0x1780/0x1780 [ 1377.913445] ? debug_check_no_obj_freed+0x201/0x490 [ 1377.918445] ? __dquot_initialize+0x298/0xb70 [ 1377.922960] ext4_bread+0x7c/0x210 [ 1377.926507] ? ext4_getblk+0x4f0/0x4f0 [ 1377.930394] ? dquot_initialize_needed+0x290/0x290 [ 1377.935313] ? trace_hardirqs_off+0x64/0x200 [ 1377.939714] ext4_append+0x155/0x370 [ 1377.943436] ext4_mkdir+0x5bd/0xe10 [ 1377.947061] ? ext4_init_dot_dotdot+0x600/0x600 [ 1377.951726] ? generic_permission+0x116/0x4d0 [ 1377.956218] ? inode_permission.part.0+0x10c/0x450 [ 1377.961145] vfs_mkdir+0x508/0x7a0 [ 1377.964682] do_mkdirat+0x262/0x2d0 [ 1377.968296] ? __ia32_sys_mknod+0x120/0x120 [ 1377.972609] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1377.977614] ? do_syscall_64+0x21/0x620 [ 1377.981574] do_syscall_64+0xf9/0x620 [ 1377.985364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1377.990538] RIP: 0033:0x7fe175b41217 [ 1377.994237] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1378.013119] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1378.020817] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 21:25:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1378.028086] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1378.035348] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1378.042601] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1378.049853] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1378.115007] BTRFS error (device loop3): superblock checksum mismatch [ 1378.132930] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (14433) 21:25:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 33) [ 1378.205543] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1378.243451] BTRFS error (device loop3): open_ctree failed [ 1378.249411] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop4 21:25:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1378.365810] BTRFS error (device loop4): superblock checksum mismatch [ 1378.376713] FAULT_INJECTION: forcing a failure. [ 1378.376713] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.389898] BTRFS error (device loop4): open_ctree failed [ 1378.403857] BTRFS error (device loop4): superblock checksum mismatch [ 1378.415845] CPU: 0 PID: 14458 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1378.420135] BTRFS error (device loop4): open_ctree failed [ 1378.423733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.423738] Call Trace: [ 1378.423760] dump_stack+0x1fc/0x2ef [ 1378.423780] should_fail.cold+0xa/0xf [ 1378.423800] ? setup_fault_attr+0x200/0x200 [ 1378.423816] ? lock_downgrade+0x720/0x720 [ 1378.423838] ? check_preemption_disabled+0x41/0x280 [ 1378.423856] __should_failslab+0x115/0x180 [ 1378.423873] should_failslab+0x5/0x10 [ 1378.423892] kmem_cache_alloc+0x277/0x370 [ 1378.423908] ext4_mb_new_blocks+0x60a/0x4370 [ 1378.423931] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1378.423944] ? ext4_cache_extents+0x68/0x2d0 [ 1378.423955] ? ext4_find_extent+0x9bb/0xc70 [ 1378.423971] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1378.423983] ? ext4_ext_search_right+0x2c7/0xb60 [ 1378.423998] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1378.424015] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1378.511884] ? __lock_acquire+0x6de/0x3ff0 [ 1378.516110] ? mark_held_locks+0xf0/0xf0 [ 1378.520159] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1378.525507] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1378.530682] ? mark_held_locks+0xf0/0xf0 [ 1378.534736] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1378.539572] ? ext4_es_lookup_extent+0x375/0xb60 [ 1378.544319] ? ext4_map_blocks+0x59f/0x1a50 [ 1378.548638] ext4_map_blocks+0x7a2/0x1a50 [ 1378.552776] ? check_preemption_disabled+0x41/0x280 [ 1378.557779] ? ext4_issue_zeroout+0x160/0x160 [ 1378.562260] ? __brelse+0x84/0xa0 [ 1378.565697] ? __ext4_new_inode+0x2eb/0x5a20 [ 1378.570095] ext4_getblk+0xad/0x4f0 [ 1378.573709] ? ext4_iomap_begin+0xe00/0xe00 [ 1378.578015] ? ext4_free_inode+0x1780/0x1780 [ 1378.582409] ? debug_check_no_obj_freed+0x201/0x490 [ 1378.587412] ? __dquot_initialize+0x298/0xb70 [ 1378.591897] ext4_bread+0x7c/0x210 [ 1378.595425] ? ext4_getblk+0x4f0/0x4f0 [ 1378.599298] ? dquot_initialize_needed+0x290/0x290 [ 1378.604212] ? trace_hardirqs_off+0x64/0x200 [ 1378.608609] ext4_append+0x155/0x370 [ 1378.612308] ext4_mkdir+0x5bd/0xe10 [ 1378.615924] ? ext4_init_dot_dotdot+0x600/0x600 [ 1378.620591] ? generic_permission+0x116/0x4d0 [ 1378.625072] ? inode_permission.part.0+0x10c/0x450 [ 1378.629989] vfs_mkdir+0x508/0x7a0 [ 1378.633516] do_mkdirat+0x262/0x2d0 [ 1378.637140] ? __ia32_sys_mknod+0x120/0x120 [ 1378.641457] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1378.646458] ? do_syscall_64+0x21/0x620 [ 1378.650421] do_syscall_64+0xf9/0x620 [ 1378.654212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1378.659386] RIP: 0033:0x7fe175b41217 [ 1378.663091] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1378.681973] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1378.689667] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b41217 [ 1378.696917] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1378.704168] RBP: 00007fe1744b71d0 R08: 0000000000000000 R09: 00007fe1744b71d0 [ 1378.711421] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1378.718672] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1378.863767] BTRFS error (device loop4): superblock checksum mismatch [ 1378.870969] BTRFS error (device loop4): open_ctree failed [ 1378.884189] BTRFS error (device loop4): superblock checksum mismatch 21:25:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 34) 21:25:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1379.010851] BTRFS error (device loop4): open_ctree failed [ 1379.026650] FAULT_INJECTION: forcing a failure. [ 1379.026650] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.057285] CPU: 1 PID: 14499 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1379.065189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.074544] Call Trace: [ 1379.077144] dump_stack+0x1fc/0x2ef [ 1379.080783] should_fail.cold+0xa/0xf [ 1379.084595] ? setup_fault_attr+0x200/0x200 [ 1379.088914] ? lock_acquire+0x170/0x3c0 [ 1379.092888] __should_failslab+0x115/0x180 [ 1379.097115] should_failslab+0x5/0x10 [ 1379.100903] __kmalloc_track_caller+0x2a6/0x3c0 [ 1379.105564] ? strndup_user+0x70/0x120 [ 1379.109444] memdup_user+0x22/0xb0 [ 1379.112975] strndup_user+0x70/0x120 [ 1379.116683] ksys_mount+0x34/0x130 [ 1379.120221] __x64_sys_mount+0xba/0x150 [ 1379.124205] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1379.128813] do_syscall_64+0xf9/0x620 [ 1379.132608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.137809] RIP: 0033:0x7fe175b4363a [ 1379.141524] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 21:25:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1379.160419] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1379.168128] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1379.175384] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1379.182728] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1379.189986] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1379.197240] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001f6ffffff0000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 35) [ 1379.291306] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 [ 1379.407773] BTRFS error (device loop5): superblock checksum mismatch [ 1379.455929] BTRFS error (device loop5): open_ctree failed [ 1379.490152] BTRFS error (device loop5): superblock checksum mismatch 21:25:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000230000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1379.516158] BTRFS error (device loop5): open_ctree failed [ 1379.550410] FAULT_INJECTION: forcing a failure. [ 1379.550410] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.562687] BTRFS error (device loop5): superblock checksum mismatch [ 1379.592803] CPU: 0 PID: 14536 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1379.600706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.606997] BTRFS error (device loop5): open_ctree failed [ 1379.610051] Call Trace: [ 1379.610074] dump_stack+0x1fc/0x2ef [ 1379.610093] should_fail.cold+0xa/0xf [ 1379.610112] ? setup_fault_attr+0x200/0x200 [ 1379.629902] ? lock_acquire+0x170/0x3c0 [ 1379.633880] __should_failslab+0x115/0x180 [ 1379.638106] should_failslab+0x5/0x10 [ 1379.641892] __kmalloc_track_caller+0x2a6/0x3c0 [ 1379.646546] ? strndup_user+0x70/0x120 [ 1379.650421] memdup_user+0x22/0xb0 [ 1379.653948] strndup_user+0x70/0x120 [ 1379.657648] ksys_mount+0x34/0x130 [ 1379.661184] __x64_sys_mount+0xba/0x150 [ 1379.665157] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1379.669731] do_syscall_64+0xf9/0x620 [ 1379.673522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.678695] RIP: 0033:0x7fe175b4363a [ 1379.682395] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1379.701282] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1379.708976] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1379.716228] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1379.723480] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1379.730730] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 21:25:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1379.737982] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 36) [ 1379.808707] BTRFS error (device loop5): superblock checksum mismatch [ 1379.842659] BTRFS error (device loop5): open_ctree failed 21:25:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00000008000002f12c0000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1379.857323] BTRFS error (device loop5): superblock checksum mismatch 21:25:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1379.924702] FAULT_INJECTION: forcing a failure. [ 1379.924702] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.936506] CPU: 0 PID: 14559 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1379.944398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.953745] Call Trace: [ 1379.956336] dump_stack+0x1fc/0x2ef [ 1379.959972] should_fail.cold+0xa/0xf [ 1379.963770] ? setup_fault_attr+0x200/0x200 [ 1379.968086] ? lock_acquire+0x170/0x3c0 [ 1379.972055] __should_failslab+0x115/0x180 [ 1379.976279] should_failslab+0x5/0x10 [ 1379.980066] kmem_cache_alloc_trace+0x284/0x380 [ 1379.984756] ? _copy_from_user+0xd2/0x130 [ 1379.988892] copy_mount_options+0x59/0x380 [ 1379.993116] ksys_mount+0x9b/0x130 [ 1379.996648] __x64_sys_mount+0xba/0x150 [ 1380.000611] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1380.005176] do_syscall_64+0xf9/0x620 [ 1380.008969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.014144] RIP: 0033:0x7fe175b4363a [ 1380.017850] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1380.036748] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1380.044438] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1380.051692] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1380.058950] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1380.066203] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1380.073457] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1380.094445] BTRFS error (device loop5): open_ctree failed 21:25:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 37) 21:25:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000420300005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1380.251923] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14576) [ 1380.269563] BTRFS error (device loop5): superblock checksum mismatch [ 1380.285499] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1380.334721] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14591) [ 1380.352715] FAULT_INJECTION: forcing a failure. [ 1380.352715] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.365798] CPU: 1 PID: 14601 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1380.373688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1380.383049] Call Trace: [ 1380.385618] dump_stack+0x1fc/0x2ef [ 1380.389352] should_fail.cold+0xa/0xf [ 1380.393151] ? setup_fault_attr+0x200/0x200 [ 1380.397470] ? lock_acquire+0x170/0x3c0 [ 1380.401435] __should_failslab+0x115/0x180 [ 1380.405649] should_failslab+0x5/0x10 [ 1380.409429] __kmalloc_track_caller+0x2a6/0x3c0 [ 1380.414085] ? strndup_user+0x70/0x120 [ 1380.417959] ? _copy_from_user+0xd2/0x130 [ 1380.422099] memdup_user+0x22/0xb0 [ 1380.425628] strndup_user+0x70/0x120 [ 1380.429321] ksys_mount+0x6f/0x130 [ 1380.432850] __x64_sys_mount+0xba/0x150 [ 1380.436814] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1380.441378] do_syscall_64+0xf9/0x620 [ 1380.445165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.450346] RIP: 0033:0x7fe175b4363a [ 1380.454058] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1380.472951] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1380.480700] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1380.487956] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1380.495219] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1380.502475] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1380.509721] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 38) [ 1380.540321] BTRFS error (device loop5): open_ctree failed [ 1380.557428] BTRFS error (device loop5): superblock checksum mismatch 21:25:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00003b0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1380.594393] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14604) 21:25:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1380.666439] BTRFS error (device loop5): open_ctree failed [ 1380.674066] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1380.695749] BTRFS error (device loop5): superblock checksum mismatch 21:25:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1380.725901] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14614) [ 1380.761595] FAULT_INJECTION: forcing a failure. [ 1380.761595] name failslab, interval 1, probability 0, space 0, times 0 21:25:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1380.782363] CPU: 1 PID: 14625 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1380.790270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1380.799621] Call Trace: [ 1380.802194] dump_stack+0x1fc/0x2ef [ 1380.805802] should_fail.cold+0xa/0xf [ 1380.809595] ? setup_fault_attr+0x200/0x200 [ 1380.813912] ? lock_acquire+0x170/0x3c0 [ 1380.817875] __should_failslab+0x115/0x180 [ 1380.822093] should_failslab+0x5/0x10 [ 1380.825870] kmem_cache_alloc+0x277/0x370 [ 1380.829995] getname_flags+0xce/0x590 [ 1380.833787] user_path_at_empty+0x2a/0x50 [ 1380.837922] do_mount+0x147/0x2f50 [ 1380.841451] ? cmp_ex_sort+0xc0/0xc0 [ 1380.845152] ? __do_page_fault+0x180/0xd60 [ 1380.849365] ? copy_mount_string+0x40/0x40 [ 1380.853594] ? memset+0x20/0x40 [ 1380.856866] ? copy_mount_options+0x26f/0x380 [ 1380.861351] ksys_mount+0xcf/0x130 [ 1380.864881] __x64_sys_mount+0xba/0x150 [ 1380.868837] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1380.873407] do_syscall_64+0xf9/0x620 [ 1380.877197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.882364] RIP: 0033:0x7fe175b4363a [ 1380.886053] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1380.904934] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1380.912627] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1380.919884] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1380.927139] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1380.934392] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1380.941655] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 39) 21:25:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1381.103656] BTRFS error (device loop5): open_ctree failed [ 1381.217862] FAULT_INJECTION: forcing a failure. [ 1381.217862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1381.229686] CPU: 0 PID: 14648 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1381.237874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.247227] Call Trace: [ 1381.249831] dump_stack+0x1fc/0x2ef [ 1381.253464] should_fail.cold+0xa/0xf [ 1381.257264] ? setup_fault_attr+0x200/0x200 [ 1381.261576] ? is_bpf_text_address+0xfc/0x1b0 [ 1381.266065] ? kernel_text_address+0xbd/0xf0 [ 1381.270464] ? __kernel_text_address+0x9/0x30 [ 1381.274952] __alloc_pages_nodemask+0x239/0x2890 [ 1381.279704] ? __lock_acquire+0x6de/0x3ff0 [ 1381.283930] ? __x64_sys_mount+0xba/0x150 [ 1381.288065] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1381.292907] ? ext4_mkdir+0x82b/0xe10 [ 1381.296876] ? mark_held_locks+0xf0/0xf0 [ 1381.300935] ? mark_held_locks+0xf0/0xf0 [ 1381.304997] ? list_lru_add+0x292/0x600 [ 1381.308969] ? mntput_no_expire+0xf2/0xa30 [ 1381.313198] cache_grow_begin+0xa4/0x8a0 [ 1381.317248] ? setup_fault_attr+0x200/0x200 [ 1381.321557] ? lock_acquire+0x170/0x3c0 [ 1381.325520] cache_alloc_refill+0x273/0x340 [ 1381.329831] kmem_cache_alloc_trace+0x354/0x380 [ 1381.334491] copy_mount_options+0x59/0x380 [ 1381.338719] ksys_mount+0x9b/0x130 [ 1381.342248] __x64_sys_mount+0xba/0x150 [ 1381.346219] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1381.350788] do_syscall_64+0xf9/0x620 [ 1381.354587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1381.359767] RIP: 0033:0x7fe175b4363a [ 1381.363475] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1381.382364] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1381.390062] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1381.397316] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1381.404570] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 21:25:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00003d0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1381.411823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1381.419075] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1381.491178] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14627) [ 1381.505976] BTRFS error (device loop5): superblock checksum mismatch [ 1381.506993] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1381.529877] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14646) 21:25:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000200000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1381.641073] BTRFS error (device loop5): open_ctree failed [ 1381.647201] BTRFS error (device loop5): superblock checksum mismatch 21:25:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 40) [ 1381.694153] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14670) 21:25:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1381.762460] BTRFS error (device loop5): open_ctree failed [ 1381.762575] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14680) [ 1381.782757] BTRFS error (device loop5): superblock checksum mismatch 21:25:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1381.811459] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1381.842155] FAULT_INJECTION: forcing a failure. [ 1381.842155] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.854296] CPU: 1 PID: 14687 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 21:25:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1381.862197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.871550] Call Trace: [ 1381.874146] dump_stack+0x1fc/0x2ef [ 1381.877791] should_fail.cold+0xa/0xf [ 1381.881600] ? setup_fault_attr+0x200/0x200 [ 1381.885927] ? lock_acquire+0x170/0x3c0 [ 1381.889917] __should_failslab+0x115/0x180 [ 1381.894161] should_failslab+0x5/0x10 [ 1381.897968] __kmalloc_track_caller+0x2a6/0x3c0 [ 1381.902639] ? kstrdup_const+0x53/0x80 [ 1381.906543] kstrdup+0x36/0x70 21:25:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1381.909742] kstrdup_const+0x53/0x80 [ 1381.913456] alloc_vfsmnt+0xb5/0x780 [ 1381.917170] ? _raw_read_unlock+0x29/0x40 [ 1381.921322] vfs_kern_mount.part.0+0x27/0x470 [ 1381.925823] do_mount+0x115c/0x2f50 [ 1381.929453] ? cmp_ex_sort+0xc0/0xc0 [ 1381.933173] ? __do_page_fault+0x180/0xd60 [ 1381.937412] ? copy_mount_string+0x40/0x40 [ 1381.941658] ? memset+0x20/0x40 [ 1381.944936] ? copy_mount_options+0x26f/0x380 [ 1381.949436] ksys_mount+0xcf/0x130 [ 1381.952990] __x64_sys_mount+0xba/0x150 [ 1381.956970] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1381.961564] do_syscall_64+0xf9/0x620 [ 1381.965373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1381.970558] RIP: 0033:0x7fe175b4363a [ 1381.974870] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1381.993751] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1382.001442] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1382.008701] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1382.015955] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1382.023209] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1382.030483] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff00000008000002f1300000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 41) [ 1382.206554] BTRFS error (device loop5): open_ctree failed [ 1382.219512] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1382.236055] BTRFS error (device loop5): superblock checksum mismatch 21:25:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1382.290073] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14706) [ 1382.309867] FAULT_INJECTION: forcing a failure. [ 1382.309867] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.334641] CPU: 0 PID: 14724 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1382.342542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.351886] Call Trace: [ 1382.354461] dump_stack+0x1fc/0x2ef [ 1382.358075] should_fail.cold+0xa/0xf [ 1382.361856] ? setup_fault_attr+0x200/0x200 [ 1382.366160] ? lock_acquire+0x170/0x3c0 [ 1382.370116] __should_failslab+0x115/0x180 [ 1382.374331] should_failslab+0x5/0x10 [ 1382.378112] kmem_cache_alloc+0x277/0x370 [ 1382.382244] alloc_vfsmnt+0x23/0x780 [ 1382.385945] vfs_kern_mount.part.0+0x27/0x470 [ 1382.390427] ? kfree+0x110/0x210 [ 1382.393779] vfs_kern_mount+0x3c/0x60 [ 1382.397568] btrfs_mount+0x23a/0xaa0 [ 1382.401265] ? btrfs_show_options+0xfd0/0xfd0 [ 1382.405742] ? __mutex_unlock_slowpath+0xea/0x610 [ 1382.410567] ? check_preemption_disabled+0x41/0x280 [ 1382.415567] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1382.420566] ? pcpu_alloc+0xc9/0x1190 [ 1382.424349] ? __lockdep_init_map+0x100/0x5a0 [ 1382.428828] mount_fs+0xa3/0x310 [ 1382.432179] vfs_kern_mount.part.0+0x68/0x470 [ 1382.436661] do_mount+0x115c/0x2f50 [ 1382.440280] ? cmp_ex_sort+0xc0/0xc0 [ 1382.443995] ? __do_page_fault+0x180/0xd60 [ 1382.448238] ? copy_mount_string+0x40/0x40 [ 1382.452466] ? memset+0x20/0x40 [ 1382.455725] ? copy_mount_options+0x26f/0x380 [ 1382.460202] ksys_mount+0xcf/0x130 [ 1382.463735] __x64_sys_mount+0xba/0x150 [ 1382.467701] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1382.472266] do_syscall_64+0xf9/0x620 [ 1382.476051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.481220] RIP: 0033:0x7fe175b4363a [ 1382.484919] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1382.503814] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1382.511512] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1382.518766] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1382.526013] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1382.533264] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1382.540690] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1382.582223] BTRFS error (device loop5): open_ctree failed [ 1382.593783] BTRFS error (device loop5): superblock checksum mismatch 21:25:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 42) 21:25:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1382.630092] BTRFS error (device loop5): open_ctree failed [ 1382.644165] BTRFS error (device loop5): superblock checksum mismatch [ 1382.651149] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (14729) [ 1382.770670] FAULT_INJECTION: forcing a failure. [ 1382.770670] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.782069] BTRFS error (device loop5): open_ctree failed [ 1382.791244] CPU: 0 PID: 14750 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1382.799138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.808482] Call Trace: [ 1382.811063] dump_stack+0x1fc/0x2ef [ 1382.814679] should_fail.cold+0xa/0xf [ 1382.818469] ? setup_fault_attr+0x200/0x200 [ 1382.822778] ? lock_acquire+0x170/0x3c0 [ 1382.826745] __should_failslab+0x115/0x180 [ 1382.830968] should_failslab+0x5/0x10 [ 1382.834755] __kmalloc_track_caller+0x2a6/0x3c0 [ 1382.839416] ? btrfs_mount+0xb5/0xaa0 [ 1382.843206] kstrdup+0x36/0x70 [ 1382.846386] btrfs_mount+0xb5/0xaa0 [ 1382.850037] ? btrfs_show_options+0xfd0/0xfd0 [ 1382.854521] ? __mutex_unlock_slowpath+0xea/0x610 [ 1382.859352] ? check_preemption_disabled+0x41/0x280 [ 1382.864359] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1382.869359] ? pcpu_alloc+0xc9/0x1190 [ 1382.873145] ? __lockdep_init_map+0x100/0x5a0 [ 1382.877626] mount_fs+0xa3/0x310 [ 1382.880984] vfs_kern_mount.part.0+0x68/0x470 [ 1382.885468] do_mount+0x115c/0x2f50 [ 1382.889084] ? cmp_ex_sort+0xc0/0xc0 [ 1382.892782] ? __do_page_fault+0x180/0xd60 [ 1382.897002] ? copy_mount_string+0x40/0x40 [ 1382.901228] ? memset+0x20/0x40 [ 1382.904494] ? copy_mount_options+0x26f/0x380 [ 1382.908978] ksys_mount+0xcf/0x130 [ 1382.912505] __x64_sys_mount+0xba/0x150 [ 1382.916468] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1382.921038] do_syscall_64+0xf9/0x620 [ 1382.924829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.930003] RIP: 0033:0x7fe175b4363a [ 1382.933702] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1382.952585] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1382.960274] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a 21:25:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000700005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1382.967528] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1382.974783] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1382.982036] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1382.989290] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1383.159966] BTRFS error (device loop4): superblock checksum mismatch [ 1383.186111] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 43) [ 1383.205872] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (14762) [ 1383.262582] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1383.299670] FAULT_INJECTION: forcing a failure. [ 1383.299670] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.313231] BTRFS error (device loop4): open_ctree failed [ 1383.321713] BTRFS error (device loop4): superblock checksum mismatch [ 1383.337610] CPU: 1 PID: 14787 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1383.345513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.354867] Call Trace: [ 1383.357449] dump_stack+0x1fc/0x2ef [ 1383.361068] should_fail.cold+0xa/0xf [ 1383.364861] ? setup_fault_attr+0x200/0x200 [ 1383.369168] ? lock_acquire+0x170/0x3c0 [ 1383.373133] __should_failslab+0x115/0x180 [ 1383.377355] should_failslab+0x5/0x10 [ 1383.381142] __kmalloc_track_caller+0x2a6/0x3c0 [ 1383.385798] ? btrfs_mount+0xb5/0xaa0 [ 1383.389586] kstrdup+0x36/0x70 [ 1383.392764] btrfs_mount+0xb5/0xaa0 [ 1383.396393] ? btrfs_show_options+0xfd0/0xfd0 [ 1383.400868] ? __mutex_unlock_slowpath+0xea/0x610 [ 1383.405700] ? check_preemption_disabled+0x41/0x280 [ 1383.410720] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1383.415740] ? pcpu_alloc+0xc9/0x1190 [ 1383.419530] ? __lockdep_init_map+0x100/0x5a0 [ 1383.424026] mount_fs+0xa3/0x310 [ 1383.427401] vfs_kern_mount.part.0+0x68/0x470 [ 1383.431886] do_mount+0x115c/0x2f50 [ 1383.435505] ? cmp_ex_sort+0xc0/0xc0 [ 1383.439206] ? __do_page_fault+0x180/0xd60 [ 1383.443431] ? copy_mount_string+0x40/0x40 [ 1383.447671] ? memset+0x20/0x40 [ 1383.450942] ? copy_mount_options+0x26f/0x380 [ 1383.455437] ksys_mount+0xcf/0x130 [ 1383.458968] __x64_sys_mount+0xba/0x150 [ 1383.462932] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1383.467502] do_syscall_64+0xf9/0x620 [ 1383.471295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1383.476472] RIP: 0033:0x7fe175b4363a [ 1383.480174] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1383.499057] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1383.506748] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a 21:25:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000500000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1383.514008] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1383.521259] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1383.528511] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1383.535764] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1383.676018] BTRFS error (device loop4): open_ctree failed [ 1383.699985] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (14802) 21:25:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 44) 21:25:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1383.720446] BTRFS error (device loop5): superblock checksum mismatch [ 1383.739673] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1383.835772] BTRFS error (device loop5): open_ctree failed [ 1383.848986] FAULT_INJECTION: forcing a failure. [ 1383.848986] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:25:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000001f00005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1383.881310] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14815) [ 1383.897215] BTRFS error (device loop5): superblock checksum mismatch [ 1383.924293] CPU: 1 PID: 14820 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1383.932214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.941563] Call Trace: [ 1383.941716] BTRFS error (device loop5): open_ctree failed [ 1383.944151] dump_stack+0x1fc/0x2ef [ 1383.944174] should_fail.cold+0xa/0xf [ 1383.957107] ? lock_acquire+0x170/0x3c0 [ 1383.961083] ? setup_fault_attr+0x200/0x200 [ 1383.965412] __alloc_pages_nodemask+0x239/0x2890 [ 1383.970169] ? __lock_acquire+0x6de/0x3ff0 [ 1383.974415] ? kernel_text_address+0xbd/0xf0 [ 1383.978817] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1383.983648] ? __save_stack_trace+0xaf/0x190 [ 1383.988062] ? __lock_acquire+0x6de/0x3ff0 [ 1383.992299] alloc_pages_current+0x193/0x2a0 [ 1383.996708] get_zeroed_page+0x10/0x40 [ 1384.000591] parse_security_options.constprop.0+0x1a/0xa0 [ 1384.006132] btrfs_mount_root+0x110/0x1830 [ 1384.010376] ? btrfs_decode_error+0x70/0x70 [ 1384.014702] ? __mutex_unlock_slowpath+0xea/0x610 [ 1384.019541] ? check_preemption_disabled+0x41/0x280 [ 1384.024554] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1384.029562] ? pcpu_alloc+0xc9/0x1190 [ 1384.033360] ? __lockdep_init_map+0x100/0x5a0 [ 1384.037848] mount_fs+0xa3/0x310 [ 1384.041209] vfs_kern_mount.part.0+0x68/0x470 [ 1384.045689] ? kfree+0x110/0x210 [ 1384.049044] vfs_kern_mount+0x3c/0x60 [ 1384.052831] btrfs_mount+0x23a/0xaa0 [ 1384.056531] ? btrfs_show_options+0xfd0/0xfd0 [ 1384.061107] ? __mutex_unlock_slowpath+0xea/0x610 [ 1384.065945] ? check_preemption_disabled+0x41/0x280 [ 1384.070966] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1384.075977] ? pcpu_alloc+0xc9/0x1190 [ 1384.079774] ? __lockdep_init_map+0x100/0x5a0 [ 1384.084264] mount_fs+0xa3/0x310 [ 1384.087630] vfs_kern_mount.part.0+0x68/0x470 [ 1384.092124] do_mount+0x115c/0x2f50 [ 1384.095743] ? cmp_ex_sort+0xc0/0xc0 [ 1384.099447] ? __do_page_fault+0x180/0xd60 [ 1384.103670] ? copy_mount_string+0x40/0x40 [ 1384.107905] ? memset+0x20/0x40 [ 1384.111176] ? copy_mount_options+0x26f/0x380 [ 1384.115663] ksys_mount+0xcf/0x130 [ 1384.119193] __x64_sys_mount+0xba/0x150 [ 1384.123154] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1384.127720] do_syscall_64+0xf9/0x620 [ 1384.131509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.136686] RIP: 0033:0x7fe175b4363a [ 1384.140387] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1384.159273] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1384.166967] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1384.174221] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1384.181472] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1384.188723] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1384.195977] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 45) 21:25:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1384.240313] BTRFS error (device loop5): superblock checksum mismatch [ 1384.272307] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (14837) 21:25:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1384.335115] BTRFS error (device loop5): open_ctree failed 21:25:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1384.494742] FAULT_INJECTION: forcing a failure. [ 1384.494742] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.506153] CPU: 1 PID: 14859 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1384.514035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1384.523384] Call Trace: [ 1384.525976] dump_stack+0x1fc/0x2ef [ 1384.529610] should_fail.cold+0xa/0xf [ 1384.533426] ? setup_fault_attr+0x200/0x200 [ 1384.537745] ? lock_acquire+0x170/0x3c0 [ 1384.541725] __should_failslab+0x115/0x180 [ 1384.545966] should_failslab+0x5/0x10 [ 1384.549772] __kmalloc_track_caller+0x2a6/0x3c0 [ 1384.554445] ? kstrdup_const+0x53/0x80 [ 1384.558366] kstrdup+0x36/0x70 [ 1384.561568] kstrdup_const+0x53/0x80 [ 1384.565289] alloc_vfsmnt+0xb5/0x780 [ 1384.569008] vfs_kern_mount.part.0+0x27/0x470 [ 1384.573507] ? kfree+0x110/0x210 [ 1384.576885] vfs_kern_mount+0x3c/0x60 [ 1384.580693] btrfs_mount+0x23a/0xaa0 [ 1384.584421] ? btrfs_show_options+0xfd0/0xfd0 [ 1384.588917] ? __mutex_unlock_slowpath+0xea/0x610 [ 1384.593770] ? check_preemption_disabled+0x41/0x280 [ 1384.598794] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1384.603819] ? pcpu_alloc+0xc9/0x1190 [ 1384.607631] ? __lockdep_init_map+0x100/0x5a0 [ 1384.612135] mount_fs+0xa3/0x310 [ 1384.615506] vfs_kern_mount.part.0+0x68/0x470 [ 1384.620011] do_mount+0x115c/0x2f50 [ 1384.623654] ? cmp_ex_sort+0xc0/0xc0 [ 1384.627374] ? __do_page_fault+0x180/0xd60 [ 1384.631614] ? copy_mount_string+0x40/0x40 [ 1384.635858] ? memset+0x20/0x40 [ 1384.639144] ? copy_mount_options+0x26f/0x380 [ 1384.643651] ksys_mount+0xcf/0x130 [ 1384.647207] __x64_sys_mount+0xba/0x150 [ 1384.651188] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1384.655771] do_syscall_64+0xf9/0x620 [ 1384.659585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.664779] RIP: 0033:0x7fe175b4363a [ 1384.668493] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1384.687391] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 21:25:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000700800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1384.695228] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1384.702496] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1384.709765] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1384.717030] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1384.724298] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1384.755907] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14857) [ 1384.791331] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1384.793197] BTRFS error (device loop4): superblock checksum mismatch [ 1384.828232] BTRFS error (device loop4): open_ctree failed [ 1384.836782] BTRFS error (device loop4): superblock checksum mismatch [ 1384.849148] BTRFS error (device loop4): open_ctree failed [ 1384.857452] BTRFS error (device loop4): superblock checksum mismatch 21:25:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000700000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 46) [ 1384.995927] BTRFS error (device loop4): open_ctree failed [ 1385.012610] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14890) [ 1385.031524] FAULT_INJECTION: forcing a failure. [ 1385.031524] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.043720] CPU: 1 PID: 14900 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1385.051612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.060959] Call Trace: [ 1385.063548] dump_stack+0x1fc/0x2ef [ 1385.067186] should_fail.cold+0xa/0xf [ 1385.070993] ? setup_fault_attr+0x200/0x200 [ 1385.075318] ? lock_acquire+0x170/0x3c0 [ 1385.079303] __should_failslab+0x115/0x180 [ 1385.083545] should_failslab+0x5/0x10 [ 1385.087350] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1385.092459] __kmalloc_node+0x38/0x70 [ 1385.096263] kvmalloc_node+0xb4/0xf0 [ 1385.099982] btrfs_mount_root+0x13f/0x1830 [ 1385.104231] ? btrfs_decode_error+0x70/0x70 [ 1385.108566] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.113418] ? check_preemption_disabled+0x41/0x280 [ 1385.118449] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.123470] ? pcpu_alloc+0xc9/0x1190 [ 1385.127273] ? __lockdep_init_map+0x100/0x5a0 [ 1385.131777] mount_fs+0xa3/0x310 [ 1385.135134] vfs_kern_mount.part.0+0x68/0x470 [ 1385.139608] ? kfree+0x110/0x210 [ 1385.142967] vfs_kern_mount+0x3c/0x60 [ 1385.146760] btrfs_mount+0x23a/0xaa0 [ 1385.150459] ? btrfs_show_options+0xfd0/0xfd0 [ 1385.154950] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.159782] ? check_preemption_disabled+0x41/0x280 [ 1385.164797] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.169804] ? pcpu_alloc+0xc9/0x1190 [ 1385.173597] ? __lockdep_init_map+0x100/0x5a0 [ 1385.178080] mount_fs+0xa3/0x310 [ 1385.181446] vfs_kern_mount.part.0+0x68/0x470 [ 1385.185930] do_mount+0x115c/0x2f50 [ 1385.189540] ? cmp_ex_sort+0xc0/0xc0 [ 1385.193235] ? __do_page_fault+0x180/0xd60 [ 1385.197561] ? copy_mount_string+0x40/0x40 [ 1385.201799] ? memset+0x20/0x40 [ 1385.205084] ? copy_mount_options+0x26f/0x380 [ 1385.209583] ksys_mount+0xcf/0x130 [ 1385.213129] __x64_sys_mount+0xba/0x150 [ 1385.217098] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1385.221669] do_syscall_64+0xf9/0x620 [ 1385.225462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.230638] RIP: 0033:0x7fe175b4363a [ 1385.234342] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1385.253227] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1385.260921] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1385.268266] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1385.275514] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1385.282769] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1385.290027] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1385.302706] BTRFS error (device loop4): superblock checksum mismatch [ 1385.340293] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14903) [ 1385.401215] BTRFS error (device loop4): open_ctree failed 21:25:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000800000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 47) [ 1385.527738] BTRFS error (device loop5): superblock checksum mismatch [ 1385.563542] BTRFS error (device loop5): open_ctree failed 21:25:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1385.614677] BTRFS error (device loop5): superblock checksum mismatch [ 1385.628162] BTRFS error (device loop5): open_ctree failed 21:25:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1385.698900] FAULT_INJECTION: forcing a failure. [ 1385.698900] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.704843] BTRFS error (device loop4): superblock checksum mismatch [ 1385.729652] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (14939) [ 1385.737614] CPU: 1 PID: 14940 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1385.749245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.758601] Call Trace: [ 1385.761195] dump_stack+0x1fc/0x2ef [ 1385.764836] should_fail.cold+0xa/0xf [ 1385.768643] ? setup_fault_attr+0x200/0x200 [ 1385.772972] ? lock_acquire+0x170/0x3c0 [ 1385.776956] __should_failslab+0x115/0x180 [ 1385.781198] should_failslab+0x5/0x10 [ 1385.785006] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1385.790124] __kmalloc_node+0x38/0x70 [ 1385.793927] kvmalloc_node+0xb4/0xf0 [ 1385.797630] btrfs_mount_root+0x13f/0x1830 [ 1385.801860] ? btrfs_decode_error+0x70/0x70 [ 1385.806171] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.811002] ? check_preemption_disabled+0x41/0x280 [ 1385.816010] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.821011] ? pcpu_alloc+0xc9/0x1190 [ 1385.824798] ? __lockdep_init_map+0x100/0x5a0 [ 1385.829280] mount_fs+0xa3/0x310 [ 1385.832636] vfs_kern_mount.part.0+0x68/0x470 [ 1385.837117] ? kfree+0x110/0x210 [ 1385.840472] vfs_kern_mount+0x3c/0x60 [ 1385.844261] btrfs_mount+0x23a/0xaa0 [ 1385.847961] ? btrfs_show_options+0xfd0/0xfd0 [ 1385.852440] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.857270] ? check_preemption_disabled+0x41/0x280 [ 1385.862278] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.867278] ? pcpu_alloc+0xc9/0x1190 [ 1385.871066] ? __lockdep_init_map+0x100/0x5a0 [ 1385.875550] mount_fs+0xa3/0x310 [ 1385.878903] vfs_kern_mount.part.0+0x68/0x470 [ 1385.883385] do_mount+0x115c/0x2f50 [ 1385.886999] ? cmp_ex_sort+0xc0/0xc0 [ 1385.890711] ? __do_page_fault+0x180/0xd60 [ 1385.894937] ? copy_mount_string+0x40/0x40 [ 1385.899162] ? memset+0x20/0x40 [ 1385.902426] ? copy_mount_options+0x26f/0x380 [ 1385.906907] ksys_mount+0xcf/0x130 [ 1385.910436] __x64_sys_mount+0xba/0x150 [ 1385.914394] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1385.918959] do_syscall_64+0xf9/0x620 [ 1385.922748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.927921] RIP: 0033:0x7fe175b4363a 21:25:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1385.931620] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1385.950500] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1385.958192] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1385.965442] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1385.972695] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1385.979948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1385.987198] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1386.140216] BTRFS error (device loop4): open_ctree failed 21:25:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 48) [ 1386.256244] BTRFS error (device loop5): superblock checksum mismatch [ 1386.281376] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14962) [ 1386.325252] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1386.336579] FAULT_INJECTION: forcing a failure. [ 1386.336579] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1386.348593] CPU: 0 PID: 14986 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1386.356564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.364192] BTRFS error (device loop5): open_ctree failed [ 1386.365910] Call Trace: [ 1386.365933] dump_stack+0x1fc/0x2ef [ 1386.365954] should_fail.cold+0xa/0xf [ 1386.365970] ? setup_fault_attr+0x200/0x200 [ 1386.365990] ? kernel_text_address+0xbd/0xf0 [ 1386.390182] ? __kernel_text_address+0x9/0x30 [ 1386.394681] __alloc_pages_nodemask+0x239/0x2890 [ 1386.399436] ? __lock_acquire+0x6de/0x3ff0 [ 1386.403661] ? vfs_kern_mount.part.0+0x68/0x470 [ 1386.408313] ? vfs_kern_mount+0x3c/0x60 [ 1386.412272] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1386.417112] ? do_mount+0x115c/0x2f50 [ 1386.420901] ? ksys_mount+0xcf/0x130 [ 1386.424603] ? __x64_sys_mount+0xba/0x150 [ 1386.428739] ? do_syscall_64+0xf9/0x620 [ 1386.432710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1386.438070] ? lock_downgrade+0x720/0x720 [ 1386.442205] ? lock_acquire+0x170/0x3c0 [ 1386.446167] ? debug_check_no_obj_freed+0xb5/0x490 [ 1386.451085] ? should_fail+0x142/0x7b0 [ 1386.454956] ? fs_reclaim_release+0xd0/0x110 [ 1386.459353] ? setup_fault_attr+0x200/0x200 [ 1386.463666] cache_grow_begin+0xa4/0x8a0 [ 1386.467718] ? setup_fault_attr+0x200/0x200 [ 1386.472035] ? lock_acquire+0x170/0x3c0 [ 1386.476001] cache_alloc_refill+0x273/0x340 [ 1386.480321] kmem_cache_alloc_trace+0x354/0x380 [ 1386.484984] btrfs_mount_root+0x188/0x1830 [ 1386.489215] ? btrfs_decode_error+0x70/0x70 [ 1386.493527] ? __mutex_unlock_slowpath+0xea/0x610 [ 1386.498366] ? check_preemption_disabled+0x41/0x280 [ 1386.503372] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1386.508374] ? pcpu_alloc+0xc9/0x1190 [ 1386.512163] ? __lockdep_init_map+0x100/0x5a0 [ 1386.516651] mount_fs+0xa3/0x310 [ 1386.520010] vfs_kern_mount.part.0+0x68/0x470 [ 1386.524491] ? kfree+0x110/0x210 [ 1386.527847] vfs_kern_mount+0x3c/0x60 [ 1386.531637] btrfs_mount+0x23a/0xaa0 [ 1386.535338] ? btrfs_show_options+0xfd0/0xfd0 [ 1386.539818] ? __mutex_unlock_slowpath+0xea/0x610 [ 1386.544653] ? check_preemption_disabled+0x41/0x280 [ 1386.549668] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1386.554673] ? pcpu_alloc+0xc9/0x1190 [ 1386.558460] ? __lockdep_init_map+0x100/0x5a0 [ 1386.562944] mount_fs+0xa3/0x310 [ 1386.566302] vfs_kern_mount.part.0+0x68/0x470 [ 1386.570786] do_mount+0x115c/0x2f50 [ 1386.574398] ? cmp_ex_sort+0xc0/0xc0 [ 1386.578096] ? __do_page_fault+0x180/0xd60 [ 1386.582321] ? copy_mount_string+0x40/0x40 [ 1386.586551] ? memset+0x20/0x40 [ 1386.589816] ? copy_mount_options+0x26f/0x380 [ 1386.594300] ksys_mount+0xcf/0x130 [ 1386.597827] __x64_sys_mount+0xba/0x150 [ 1386.601788] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1386.606354] do_syscall_64+0xf9/0x620 [ 1386.610142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1386.615317] RIP: 0033:0x7fe175b4363a [ 1386.619016] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1386.637902] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1386.645595] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1386.652846] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1386.660099] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1386.667351] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 21:25:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1386.674603] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1386.684530] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (14983) 21:25:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x225c17d03, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000005c00005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1386.719232] BTRFS error (device loop5): superblock checksum mismatch 21:25:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1386.841373] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (14997) 21:25:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1386.935902] BTRFS error (device loop5): open_ctree failed [ 1386.989977] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1387.006643] BTRFS error (device loop5): superblock checksum mismatch 21:25:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 49) [ 1387.090866] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (15025) [ 1387.116231] BTRFS error (device loop5): open_ctree failed [ 1387.119788] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1387.152421] FAULT_INJECTION: forcing a failure. [ 1387.152421] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.179101] CPU: 0 PID: 15029 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1387.186312] BTRFS error (device loop5): superblock checksum mismatch [ 1387.187005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:25:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1387.202822] Call Trace: [ 1387.205415] dump_stack+0x1fc/0x2ef [ 1387.209057] should_fail.cold+0xa/0xf [ 1387.212872] ? setup_fault_attr+0x200/0x200 [ 1387.217199] ? lock_acquire+0x170/0x3c0 [ 1387.221181] __should_failslab+0x115/0x180 [ 1387.225412] should_failslab+0x5/0x10 [ 1387.229197] kmem_cache_alloc+0x277/0x370 [ 1387.233346] getname_kernel+0x4e/0x370 [ 1387.237223] kern_path+0x1b/0x40 [ 1387.240572] lookup_bdev+0xfc/0x220 [ 1387.244188] ? bd_acquire+0x440/0x440 [ 1387.247988] ? debug_check_no_obj_freed+0x201/0x490 [ 1387.252998] blkdev_get_by_path+0x1b/0xd0 [ 1387.257132] btrfs_scan_one_device+0xd0/0xd00 [ 1387.261615] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1387.266703] ? debug_check_no_obj_freed+0x201/0x490 [ 1387.271702] ? device_list_add+0xdd0/0xdd0 [ 1387.275917] ? kfree+0x110/0x210 [ 1387.279267] ? btrfs_mount_root+0x107a/0x1830 [ 1387.283746] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1387.288319] btrfs_mount_root+0x9df/0x1830 [ 1387.292539] ? btrfs_decode_error+0x70/0x70 [ 1387.296844] ? __mutex_unlock_slowpath+0xea/0x610 [ 1387.301671] ? check_preemption_disabled+0x41/0x280 [ 1387.306678] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1387.311675] ? pcpu_alloc+0xc9/0x1190 [ 1387.315462] ? __lockdep_init_map+0x100/0x5a0 [ 1387.319941] mount_fs+0xa3/0x310 [ 1387.323303] vfs_kern_mount.part.0+0x68/0x470 [ 1387.327783] ? kfree+0x110/0x210 [ 1387.331147] vfs_kern_mount+0x3c/0x60 [ 1387.334932] btrfs_mount+0x23a/0xaa0 [ 1387.338628] ? btrfs_show_options+0xfd0/0xfd0 [ 1387.343109] ? __mutex_unlock_slowpath+0xea/0x610 [ 1387.347953] ? check_preemption_disabled+0x41/0x280 [ 1387.352957] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1387.357954] ? pcpu_alloc+0xc9/0x1190 [ 1387.361738] ? __lockdep_init_map+0x100/0x5a0 [ 1387.366217] mount_fs+0xa3/0x310 [ 1387.369570] vfs_kern_mount.part.0+0x68/0x470 [ 1387.374048] do_mount+0x115c/0x2f50 [ 1387.377681] ? cmp_ex_sort+0xc0/0xc0 [ 1387.381397] ? __do_page_fault+0x180/0xd60 [ 1387.385624] ? copy_mount_string+0x40/0x40 [ 1387.389858] ? memset+0x20/0x40 [ 1387.393120] ? copy_mount_options+0x26f/0x380 [ 1387.397600] ksys_mount+0xcf/0x130 [ 1387.401140] __x64_sys_mount+0xba/0x150 [ 1387.405108] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1387.409671] do_syscall_64+0xf9/0x620 [ 1387.413459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1387.418640] RIP: 0033:0x7fe175b4363a [ 1387.422331] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1387.441210] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1387.449327] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1387.456582] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1387.463834] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1387.471082] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1387.478335] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 50) 21:25:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1387.553155] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (15036) [ 1387.576003] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1387.611628] BTRFS error (device loop5): open_ctree failed [ 1387.617845] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (15049) [ 1387.638494] BTRFS error (device loop5): superblock checksum mismatch 21:25:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1387.684217] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1387.840466] BTRFS error (device loop5): open_ctree failed [ 1387.840495] FAULT_INJECTION: forcing a failure. [ 1387.840495] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.861329] CPU: 0 PID: 15063 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1387.869220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1387.878550] Call Trace: [ 1387.881120] dump_stack+0x1fc/0x2ef [ 1387.884728] should_fail.cold+0xa/0xf [ 1387.888510] ? setup_fault_attr+0x200/0x200 [ 1387.892812] ? lock_acquire+0x170/0x3c0 [ 1387.896771] __should_failslab+0x115/0x180 [ 1387.900988] should_failslab+0x5/0x10 [ 1387.904769] kmem_cache_alloc+0x277/0x370 [ 1387.908897] getname_kernel+0x4e/0x370 [ 1387.912769] kern_path+0x1b/0x40 [ 1387.916112] lookup_bdev+0xfc/0x220 [ 1387.919718] ? bd_acquire+0x440/0x440 [ 1387.923501] ? debug_check_no_obj_freed+0x201/0x490 [ 1387.928510] blkdev_get_by_path+0x1b/0xd0 [ 1387.932639] btrfs_scan_one_device+0xd0/0xd00 [ 1387.937116] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1387.942194] ? debug_check_no_obj_freed+0x201/0x490 [ 1387.947189] ? device_list_add+0xdd0/0xdd0 [ 1387.951409] ? kfree+0x110/0x210 [ 1387.954755] ? btrfs_mount_root+0x107a/0x1830 [ 1387.959230] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1387.963804] btrfs_mount_root+0x9df/0x1830 [ 1387.968026] ? btrfs_decode_error+0x70/0x70 [ 1387.972328] ? __mutex_unlock_slowpath+0xea/0x610 [ 1387.977151] ? check_preemption_disabled+0x41/0x280 [ 1387.982149] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1387.987147] ? pcpu_alloc+0xc9/0x1190 [ 1387.990927] ? __lockdep_init_map+0x100/0x5a0 [ 1387.995405] mount_fs+0xa3/0x310 [ 1387.998754] vfs_kern_mount.part.0+0x68/0x470 [ 1388.003228] ? kfree+0x110/0x210 [ 1388.006574] vfs_kern_mount+0x3c/0x60 [ 1388.010354] btrfs_mount+0x23a/0xaa0 [ 1388.014047] ? btrfs_show_options+0xfd0/0xfd0 [ 1388.018519] ? __mutex_unlock_slowpath+0xea/0x610 [ 1388.023343] ? check_preemption_disabled+0x41/0x280 [ 1388.028340] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1388.033336] ? pcpu_alloc+0xc9/0x1190 [ 1388.037118] ? __lockdep_init_map+0x100/0x5a0 [ 1388.041593] mount_fs+0xa3/0x310 [ 1388.044940] vfs_kern_mount.part.0+0x68/0x470 [ 1388.049414] do_mount+0x115c/0x2f50 [ 1388.053031] ? cmp_ex_sort+0xc0/0xc0 [ 1388.056726] ? __do_page_fault+0x180/0xd60 [ 1388.060939] ? copy_mount_string+0x40/0x40 [ 1388.065156] ? memset+0x20/0x40 [ 1388.068415] ? copy_mount_options+0x26f/0x380 [ 1388.072891] ksys_mount+0xcf/0x130 [ 1388.076412] __x64_sys_mount+0xba/0x150 [ 1388.080367] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1388.084929] do_syscall_64+0xf9/0x620 [ 1388.088711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.093878] RIP: 0033:0x7fe175b4363a [ 1388.097570] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1388.116446] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1388.124129] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1388.131389] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 21:25:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1388.138648] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1388.145898] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1388.153143] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 51) [ 1388.261117] BTRFS error (device loop5): superblock checksum mismatch [ 1388.282339] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (15079) [ 1388.325655] BTRFS error (device loop5): open_ctree failed [ 1388.332494] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (15088) [ 1388.347792] BTRFS error (device loop5): superblock checksum mismatch 21:25:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001007000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1388.380544] BTRFS error (device loop5): open_ctree failed [ 1388.386339] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1388.398367] BTRFS error (device loop5): superblock checksum mismatch [ 1388.414604] FAULT_INJECTION: forcing a failure. [ 1388.414604] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.482099] CPU: 1 PID: 15104 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1388.490016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.499366] Call Trace: [ 1388.501949] dump_stack+0x1fc/0x2ef [ 1388.505572] should_fail.cold+0xa/0xf [ 1388.509358] ? setup_fault_attr+0x200/0x200 [ 1388.513663] ? lock_acquire+0x170/0x3c0 [ 1388.517634] __should_failslab+0x115/0x180 [ 1388.521859] should_failslab+0x5/0x10 [ 1388.525644] __kmalloc_track_caller+0x2a6/0x3c0 [ 1388.530297] ? btrfs_mount_root+0x364/0x1830 [ 1388.534690] kstrdup+0x36/0x70 [ 1388.537869] btrfs_mount_root+0x364/0x1830 [ 1388.542109] ? btrfs_decode_error+0x70/0x70 [ 1388.546425] ? __mutex_unlock_slowpath+0xea/0x610 [ 1388.551529] ? check_preemption_disabled+0x41/0x280 [ 1388.556528] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1388.561526] ? pcpu_alloc+0xc9/0x1190 [ 1388.565308] ? __lockdep_init_map+0x100/0x5a0 [ 1388.569797] mount_fs+0xa3/0x310 [ 1388.573159] vfs_kern_mount.part.0+0x68/0x470 [ 1388.577643] ? kfree+0x110/0x210 [ 1388.580990] vfs_kern_mount+0x3c/0x60 [ 1388.584791] btrfs_mount+0x23a/0xaa0 [ 1388.588508] ? btrfs_show_options+0xfd0/0xfd0 [ 1388.592985] ? __mutex_unlock_slowpath+0xea/0x610 [ 1388.597813] ? check_preemption_disabled+0x41/0x280 [ 1388.602824] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1388.607839] ? pcpu_alloc+0xc9/0x1190 [ 1388.611639] ? __lockdep_init_map+0x100/0x5a0 [ 1388.616143] mount_fs+0xa3/0x310 [ 1388.619521] vfs_kern_mount.part.0+0x68/0x470 [ 1388.624021] do_mount+0x115c/0x2f50 [ 1388.627636] ? cmp_ex_sort+0xc0/0xc0 [ 1388.631332] ? __do_page_fault+0x180/0xd60 [ 1388.635548] ? copy_mount_string+0x40/0x40 [ 1388.639774] ? memset+0x20/0x40 [ 1388.643034] ? copy_mount_options+0x26f/0x380 [ 1388.647509] ksys_mount+0xcf/0x130 [ 1388.651031] __x64_sys_mount+0xba/0x150 [ 1388.654986] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1388.659549] do_syscall_64+0xf9/0x620 [ 1388.663333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.668502] RIP: 0033:0x7fe175b4363a [ 1388.672201] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1388.691083] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1388.698770] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1388.706018] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1388.713266] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1388.720513] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1388.727761] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 52) [ 1388.793208] BTRFS error (device loop5): open_ctree failed 21:25:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1388.937674] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (15118) [ 1388.950403] BTRFS error (device loop1): superblock checksum mismatch 21:25:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1389.001781] BTRFS error (device loop1): open_ctree failed 21:25:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1389.069784] FAULT_INJECTION: forcing a failure. [ 1389.069784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1389.083359] BTRFS error (device loop5): superblock checksum mismatch [ 1389.116911] CPU: 0 PID: 15139 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1389.124825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.134175] Call Trace: [ 1389.136772] dump_stack+0x1fc/0x2ef [ 1389.140411] should_fail.cold+0xa/0xf [ 1389.144214] ? lock_acquire+0x170/0x3c0 [ 1389.148458] ? setup_fault_attr+0x200/0x200 [ 1389.152792] __alloc_pages_nodemask+0x239/0x2890 [ 1389.157546] ? blkdev_get+0x59a/0x940 [ 1389.161348] ? __radix_tree_lookup+0x216/0x370 [ 1389.165936] ? find_get_entry+0x4cd/0x8a0 [ 1389.170091] ? lock_downgrade+0x720/0x720 [ 1389.174241] ? __radix_tree_lookup+0x370/0x370 [ 1389.178830] ? check_preemption_disabled+0x41/0x280 [ 1389.183853] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1389.188697] ? iput+0xc9/0x860 [ 1389.191893] ? find_get_pages_range_tag+0xc50/0xc50 [ 1389.196911] ? blkdev_get+0xd0/0x940 [ 1389.200633] alloc_pages_current+0x193/0x2a0 [ 1389.205046] do_read_cache_page+0xa36/0x1170 [ 1389.209467] ? blkdev_writepages+0x20/0x20 [ 1389.213708] btrfs_scan_one_device+0x195/0xd00 [ 1389.218293] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1389.223397] ? debug_check_no_obj_freed+0x201/0x490 [ 1389.228417] ? device_list_add+0xdd0/0xdd0 [ 1389.232655] ? kfree+0x110/0x210 [ 1389.236026] ? btrfs_mount_root+0x107a/0x1830 [ 1389.240522] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1389.245112] btrfs_mount_root+0x9df/0x1830 [ 1389.249361] ? btrfs_decode_error+0x70/0x70 [ 1389.253684] ? __mutex_unlock_slowpath+0xea/0x610 [ 1389.258530] ? check_preemption_disabled+0x41/0x280 [ 1389.263555] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1389.268575] ? pcpu_alloc+0xc9/0x1190 [ 1389.272365] ? __lockdep_init_map+0x100/0x5a0 [ 1389.276843] mount_fs+0xa3/0x310 [ 1389.280191] vfs_kern_mount.part.0+0x68/0x470 [ 1389.284662] ? kfree+0x110/0x210 [ 1389.288022] vfs_kern_mount+0x3c/0x60 [ 1389.291815] btrfs_mount+0x23a/0xaa0 [ 1389.295509] ? btrfs_show_options+0xfd0/0xfd0 [ 1389.299981] ? __mutex_unlock_slowpath+0xea/0x610 [ 1389.304807] ? check_preemption_disabled+0x41/0x280 [ 1389.309806] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1389.314802] ? pcpu_alloc+0xc9/0x1190 [ 1389.318582] ? __lockdep_init_map+0x100/0x5a0 [ 1389.323058] mount_fs+0xa3/0x310 [ 1389.326405] vfs_kern_mount.part.0+0x68/0x470 [ 1389.330889] do_mount+0x115c/0x2f50 [ 1389.334499] ? cmp_ex_sort+0xc0/0xc0 [ 1389.338193] ? __do_page_fault+0x180/0xd60 [ 1389.342409] ? copy_mount_string+0x40/0x40 [ 1389.346628] ? memset+0x20/0x40 [ 1389.349898] ? copy_mount_options+0x26f/0x380 [ 1389.354373] ksys_mount+0xcf/0x130 [ 1389.357898] __x64_sys_mount+0xba/0x150 [ 1389.361850] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1389.366424] do_syscall_64+0xf9/0x620 [ 1389.370223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.375390] RIP: 0033:0x7fe175b4363a [ 1389.379080] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1389.397957] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1389.405643] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1389.412892] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1389.420150] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1389.427413] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1389.434666] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1389.479017] BTRFS error (device loop5): open_ctree failed [ 1389.500479] BTRFS error (device loop5): superblock checksum mismatch 21:25:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 53) [ 1389.536988] BTRFS error (device loop5): open_ctree failed [ 1389.571891] BTRFS error (device loop5): superblock checksum mismatch 21:25:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1389.586506] BTRFS error (device loop5): open_ctree failed [ 1389.599840] BTRFS error (device loop5): superblock checksum mismatch [ 1389.608272] BTRFS error (device loop5): open_ctree failed [ 1389.620053] BTRFS error (device loop5): superblock checksum mismatch 21:25:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1389.641661] FAULT_INJECTION: forcing a failure. [ 1389.641661] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.653293] CPU: 1 PID: 15185 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1389.661188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.670543] Call Trace: [ 1389.673142] dump_stack+0x1fc/0x2ef [ 1389.676780] should_fail.cold+0xa/0xf [ 1389.680590] ? setup_fault_attr+0x200/0x200 [ 1389.684916] ? __lock_acquire+0x6de/0x3ff0 [ 1389.689159] __should_failslab+0x115/0x180 [ 1389.693410] should_failslab+0x5/0x10 [ 1389.697222] kmem_cache_alloc+0x3f/0x370 [ 1389.701294] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1389.706927] __radix_tree_create+0x314/0x540 [ 1389.711353] page_cache_tree_insert+0xac/0x3f0 [ 1389.715943] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1389.721397] ? lock_acquire+0x170/0x3c0 [ 1389.725392] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1389.730600] __add_to_page_cache_locked+0x46e/0xb60 [ 1389.735625] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1389.740471] ? iput+0xc9/0x860 [ 1389.743666] add_to_page_cache_lru+0x16a/0x680 [ 1389.748250] ? add_to_page_cache_locked+0x40/0x40 [ 1389.753078] do_read_cache_page+0x50a/0x1170 [ 1389.757470] ? blkdev_writepages+0x20/0x20 [ 1389.761688] btrfs_scan_one_device+0x195/0xd00 [ 1389.766258] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1389.771344] ? debug_check_no_obj_freed+0x201/0x490 [ 1389.776342] ? device_list_add+0xdd0/0xdd0 [ 1389.780557] ? kfree+0x110/0x210 [ 1389.783904] ? btrfs_mount_root+0x107a/0x1830 [ 1389.788379] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1389.792958] btrfs_mount_root+0x9df/0x1830 [ 1389.797185] ? btrfs_decode_error+0x70/0x70 [ 1389.801500] ? __mutex_unlock_slowpath+0xea/0x610 [ 1389.806343] ? check_preemption_disabled+0x41/0x280 [ 1389.811358] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1389.816363] ? pcpu_alloc+0xc9/0x1190 [ 1389.820149] ? __lockdep_init_map+0x100/0x5a0 [ 1389.824622] mount_fs+0xa3/0x310 [ 1389.827970] vfs_kern_mount.part.0+0x68/0x470 [ 1389.832440] ? kfree+0x110/0x210 [ 1389.835787] vfs_kern_mount+0x3c/0x60 [ 1389.839570] btrfs_mount+0x23a/0xaa0 [ 1389.843267] ? btrfs_show_options+0xfd0/0xfd0 [ 1389.847742] ? __mutex_unlock_slowpath+0xea/0x610 [ 1389.852573] ? check_preemption_disabled+0x41/0x280 [ 1389.857574] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1389.862570] ? pcpu_alloc+0xc9/0x1190 [ 1389.866351] ? __lockdep_init_map+0x100/0x5a0 [ 1389.870833] mount_fs+0xa3/0x310 [ 1389.874188] vfs_kern_mount.part.0+0x68/0x470 [ 1389.878670] do_mount+0x115c/0x2f50 [ 1389.882280] ? cmp_ex_sort+0xc0/0xc0 [ 1389.885974] ? __do_page_fault+0x180/0xd60 [ 1389.890187] ? copy_mount_string+0x40/0x40 [ 1389.894403] ? memset+0x20/0x40 [ 1389.897658] ? copy_mount_options+0x26f/0x380 [ 1389.902134] ksys_mount+0xcf/0x130 [ 1389.905656] __x64_sys_mount+0xba/0x150 [ 1389.909607] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1389.914166] do_syscall_64+0xf9/0x620 [ 1389.917947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.923113] RIP: 0033:0x7fe175b4363a [ 1389.926804] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1389.945682] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1389.953365] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1389.960608] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1389.967854] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1389.975100] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1389.982346] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001008600000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 21:25:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1390.065841] BTRFS error (device loop5): open_ctree failed 21:25:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 54) [ 1390.218328] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (15206) [ 1390.237369] BTRFS error (device loop5): superblock checksum mismatch 21:25:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1390.288918] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (15210) [ 1390.305971] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) 21:25:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1390.416278] BTRFS error (device loop5): open_ctree failed [ 1390.433822] FAULT_INJECTION: forcing a failure. [ 1390.433822] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.449835] BTRFS error (device loop5): superblock checksum mismatch [ 1390.474914] CPU: 1 PID: 15227 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1390.482815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.492170] Call Trace: [ 1390.494768] dump_stack+0x1fc/0x2ef [ 1390.498404] should_fail.cold+0xa/0xf [ 1390.502208] ? mount_fs+0xa3/0x310 [ 1390.505758] ? setup_fault_attr+0x200/0x200 [ 1390.510080] ? blk_queue_enter+0x40b/0xb70 [ 1390.514324] __should_failslab+0x115/0x180 [ 1390.518651] should_failslab+0x5/0x10 21:25:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1390.522454] kmem_cache_alloc_node+0x54/0x3b0 [ 1390.526960] create_task_io_context+0x2c/0x430 [ 1390.531553] generic_make_request_checks+0x1c4f/0x22e0 [ 1390.536845] ? should_fail_bio.isra.0+0xa0/0xa0 [ 1390.541524] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1390.546542] ? kmem_cache_alloc+0x315/0x370 [ 1390.550872] generic_make_request+0x23f/0xdf0 [ 1390.555378] ? blk_put_request+0x110/0x110 [ 1390.559618] ? lock_downgrade+0x720/0x720 [ 1390.563781] submit_bio+0xb1/0x430 [ 1390.567330] ? generic_make_request+0xdf0/0xdf0 [ 1390.572002] ? check_preemption_disabled+0x41/0x280 [ 1390.577031] ? guard_bio_eod+0x2a0/0x650 [ 1390.581101] submit_bh_wbc+0x5a7/0x760 [ 1390.584997] __bread_gfp+0x14e/0x300 [ 1390.588722] btrfs_read_dev_super+0x8a/0x230 [ 1390.593132] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1390.597642] open_fs_devices+0x5a3/0xa50 [ 1390.601735] ? find_fsid+0xb0/0xb0 [ 1390.605290] btrfs_open_devices+0x114/0x150 [ 1390.609618] btrfs_mount_root+0xa60/0x1830 [ 1390.613868] ? btrfs_decode_error+0x70/0x70 [ 1390.618194] ? __mutex_unlock_slowpath+0xea/0x610 21:25:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1390.623040] ? check_preemption_disabled+0x41/0x280 [ 1390.628066] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1390.633089] ? pcpu_alloc+0xc9/0x1190 [ 1390.636893] ? __lockdep_init_map+0x100/0x5a0 [ 1390.641393] mount_fs+0xa3/0x310 [ 1390.644767] vfs_kern_mount.part.0+0x68/0x470 [ 1390.649613] ? kfree+0x110/0x210 [ 1390.652989] vfs_kern_mount+0x3c/0x60 [ 1390.656797] btrfs_mount+0x23a/0xaa0 [ 1390.660516] ? btrfs_show_options+0xfd0/0xfd0 [ 1390.665009] ? __mutex_unlock_slowpath+0xea/0x610 [ 1390.669864] ? check_preemption_disabled+0x41/0x280 21:25:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) [ 1390.674890] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1390.679911] ? pcpu_alloc+0xc9/0x1190 [ 1390.683719] ? __lockdep_init_map+0x100/0x5a0 [ 1390.688220] mount_fs+0xa3/0x310 [ 1390.691595] vfs_kern_mount.part.0+0x68/0x470 [ 1390.696100] do_mount+0x115c/0x2f50 [ 1390.699735] ? cmp_ex_sort+0xc0/0xc0 [ 1390.703456] ? __do_page_fault+0x180/0xd60 [ 1390.707697] ? copy_mount_string+0x40/0x40 [ 1390.711943] ? memset+0x20/0x40 [ 1390.715228] ? copy_mount_options+0x26f/0x380 [ 1390.719740] ksys_mount+0xcf/0x130 [ 1390.723279] __x64_sys_mount+0xba/0x150 [ 1390.727255] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1390.731839] do_syscall_64+0xf9/0x620 [ 1390.735648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.740839] RIP: 0033:0x7fe175b4363a [ 1390.744550] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1390.763449] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1390.771156] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1390.778422] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1390.785691] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1390.792959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1390.800231] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 55) 21:25:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1390.856391] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (15236) [ 1390.870061] BTRFS error (device loop5): open_ctree failed [ 1390.875880] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (15244) [ 1390.898601] BTRFS error (device loop5): superblock checksum mismatch 21:25:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1390.932359] BTRFS warning (device ): duplicate device /dev/loop3 devid 1 generation 7 scanned by systemd-udevd (1639) [ 1391.016634] BTRFS error (device loop5): open_ctree failed [ 1391.026357] FAULT_INJECTION: forcing a failure. [ 1391.026357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1391.038166] CPU: 1 PID: 15268 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1391.046048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.055740] Call Trace: [ 1391.058315] dump_stack+0x1fc/0x2ef [ 1391.061943] should_fail.cold+0xa/0xf [ 1391.065739] ? setup_fault_attr+0x200/0x200 [ 1391.070062] __alloc_pages_nodemask+0x239/0x2890 [ 1391.074815] ? __save_stack_trace+0x72/0x190 [ 1391.079230] ? deref_stack_reg+0x134/0x1d0 [ 1391.083472] ? mark_held_locks+0xf0/0xf0 [ 1391.087523] ? unwind_next_frame+0xeee/0x1400 [ 1391.092011] ? __lock_acquire+0x6de/0x3ff0 [ 1391.096230] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1391.101069] ? is_bpf_text_address+0xd5/0x1b0 [ 1391.105556] ? __bpf_address_lookup+0x330/0x330 [ 1391.110209] ? check_preemption_disabled+0x41/0x280 [ 1391.115222] ? is_bpf_text_address+0xfc/0x1b0 [ 1391.119710] ? kernel_text_address+0xbd/0xf0 [ 1391.124114] cache_grow_begin+0xa4/0x8a0 [ 1391.128168] ? setup_fault_attr+0x200/0x200 [ 1391.132476] ? lock_acquire+0x170/0x3c0 [ 1391.136433] cache_alloc_refill+0x273/0x340 [ 1391.140751] kmem_cache_alloc+0x346/0x370 [ 1391.144901] getname_kernel+0x4e/0x370 [ 1391.149132] kern_path+0x1b/0x40 [ 1391.152478] lookup_bdev+0xfc/0x220 [ 1391.156082] ? bd_acquire+0x440/0x440 [ 1391.159865] ? debug_check_no_obj_freed+0x201/0x490 [ 1391.164877] blkdev_get_by_path+0x1b/0xd0 [ 1391.169019] btrfs_scan_one_device+0xd0/0xd00 [ 1391.173516] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1391.178607] ? debug_check_no_obj_freed+0x201/0x490 [ 1391.183615] ? device_list_add+0xdd0/0xdd0 [ 1391.187835] ? kfree+0x110/0x210 [ 1391.191181] ? btrfs_mount_root+0x107a/0x1830 [ 1391.195659] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1391.200234] btrfs_mount_root+0x9df/0x1830 [ 1391.204476] ? btrfs_decode_error+0x70/0x70 [ 1391.208786] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.213624] ? check_preemption_disabled+0x41/0x280 [ 1391.218644] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.223657] ? pcpu_alloc+0xc9/0x1190 [ 1391.227461] ? __lockdep_init_map+0x100/0x5a0 [ 1391.231940] mount_fs+0xa3/0x310 [ 1391.235292] vfs_kern_mount.part.0+0x68/0x470 [ 1391.239774] ? kfree+0x110/0x210 [ 1391.243139] vfs_kern_mount+0x3c/0x60 [ 1391.246934] btrfs_mount+0x23a/0xaa0 [ 1391.250993] ? btrfs_show_options+0xfd0/0xfd0 [ 1391.255468] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.260306] ? check_preemption_disabled+0x41/0x280 [ 1391.265318] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.270314] ? pcpu_alloc+0xc9/0x1190 [ 1391.274096] ? __lockdep_init_map+0x100/0x5a0 [ 1391.278572] mount_fs+0xa3/0x310 [ 1391.281935] vfs_kern_mount.part.0+0x68/0x470 [ 1391.286424] do_mount+0x115c/0x2f50 [ 1391.290039] ? cmp_ex_sort+0xc0/0xc0 [ 1391.293735] ? __do_page_fault+0x180/0xd60 [ 1391.297949] ? copy_mount_string+0x40/0x40 [ 1391.302181] ? memset+0x20/0x40 [ 1391.305452] ? copy_mount_options+0x26f/0x380 [ 1391.309940] ksys_mount+0xcf/0x130 [ 1391.313472] __x64_sys_mount+0xba/0x150 [ 1391.317439] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1391.322019] do_syscall_64+0xf9/0x620 [ 1391.325818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.330986] RIP: 0033:0x7fe175b4363a [ 1391.334681] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1391.354095] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1391.361806] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1391.369066] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1391.376314] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1391.383574] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1391.390834] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0001de0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@rescan_uuid_tree}]}) 21:25:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) 21:25:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 56) [ 1391.508101] BTRFS error (device loop4): superblock checksum mismatch [ 1391.588155] BTRFS error (device loop4): open_ctree failed 21:25:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x11b, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 1391.645491] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (15294) [ 1391.658568] BTRFS error (device loop5): superblock checksum mismatch [ 1391.672221] FAULT_INJECTION: forcing a failure. [ 1391.672221] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.689503] CPU: 0 PID: 15303 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1391.697389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.706738] Call Trace: [ 1391.709332] dump_stack+0x1fc/0x2ef [ 1391.712970] should_fail.cold+0xa/0xf [ 1391.716784] ? setup_fault_attr+0x200/0x200 [ 1391.721120] __should_failslab+0x115/0x180 [ 1391.725365] should_failslab+0x5/0x10 [ 1391.729170] kmem_cache_alloc+0x3f/0x370 [ 1391.733236] ? mempool_alloc+0x350/0x350 [ 1391.737300] mempool_alloc+0x146/0x350 [ 1391.741196] ? mempool_resize+0x790/0x790 [ 1391.745355] ? lock_downgrade+0x720/0x720 [ 1391.749501] ? mark_held_locks+0xa6/0xf0 [ 1391.753562] bio_alloc_bioset+0x389/0x5e0 [ 1391.757720] ? __find_get_block+0x314/0xde0 [ 1391.762048] ? bvec_alloc+0x2f0/0x2f0 [ 1391.765855] ? __getblk_slow+0x6a3/0x9e0 [ 1391.769927] submit_bh_wbc+0x141/0x760 [ 1391.773822] __bread_gfp+0x14e/0x300 [ 1391.777542] btrfs_read_dev_super+0x8a/0x230 [ 1391.781955] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1391.786460] open_fs_devices+0x5a3/0xa50 [ 1391.790528] ? find_fsid+0xb0/0xb0 [ 1391.794082] btrfs_open_devices+0x114/0x150 [ 1391.798412] btrfs_mount_root+0xa60/0x1830 [ 1391.802662] ? btrfs_decode_error+0x70/0x70 [ 1391.806988] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.811845] ? check_preemption_disabled+0x41/0x280 [ 1391.816873] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.821883] ? pcpu_alloc+0xc9/0x1190 [ 1391.825671] ? __lockdep_init_map+0x100/0x5a0 [ 1391.830150] mount_fs+0xa3/0x310 [ 1391.833501] vfs_kern_mount.part.0+0x68/0x470 [ 1391.837976] ? kfree+0x110/0x210 [ 1391.841324] vfs_kern_mount+0x3c/0x60 [ 1391.845117] btrfs_mount+0x23a/0xaa0 [ 1391.848826] ? btrfs_show_options+0xfd0/0xfd0 [ 1391.853312] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.858145] ? check_preemption_disabled+0x41/0x280 [ 1391.863153] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.868161] ? pcpu_alloc+0xc9/0x1190 [ 1391.871952] ? __lockdep_init_map+0x100/0x5a0 [ 1391.876438] mount_fs+0xa3/0x310 [ 1391.879816] vfs_kern_mount.part.0+0x68/0x470 [ 1391.884316] do_mount+0x115c/0x2f50 [ 1391.887934] ? cmp_ex_sort+0xc0/0xc0 [ 1391.891633] ? __do_page_fault+0x180/0xd60 [ 1391.895847] ? copy_mount_string+0x40/0x40 [ 1391.900067] ? memset+0x20/0x40 [ 1391.903330] ? copy_mount_options+0x26f/0x380 [ 1391.907807] ksys_mount+0xcf/0x130 [ 1391.911328] __x64_sys_mount+0xba/0x150 [ 1391.915289] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1391.919855] do_syscall_64+0xf9/0x620 [ 1391.923650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.928825] RIP: 0033:0x7fe175b4363a 21:25:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1391.932519] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1391.951852] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1391.959559] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1391.966828] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1391.974094] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1391.981363] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1391.988632] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 21:25:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d04a88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 57) [ 1392.080025] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by systemd-udevd (1509) [ 1392.103281] BTRFS error (device loop5): open_ctree failed [ 1392.109281] BTRFS warning (device ): duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (15321) 21:25:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0, 0x0, 0x500000}], 0x0, &(0x7f00000005c0)) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:25:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000a000500010000ffff00000001ffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000000fff00005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0, 0x0, 0x101ea0}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) [ 1392.135224] BTRFS error (device loop5): superblock checksum mismatch [ 1392.213705] FAULT_INJECTION: forcing a failure. [ 1392.213705] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.229556] CPU: 0 PID: 15335 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1392.237464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.246808] Call Trace: [ 1392.249382] dump_stack+0x1fc/0x2ef [ 1392.252995] should_fail.cold+0xa/0xf [ 1392.256781] ? setup_fault_attr+0x200/0x200 [ 1392.261084] ? lock_acquire+0x170/0x3c0 [ 1392.265041] __should_failslab+0x115/0x180 [ 1392.269270] should_failslab+0x5/0x10 [ 1392.273052] kmem_cache_alloc_trace+0x284/0x380 [ 1392.277703] btrfs_alloc_device+0xae/0x670 [ 1392.281919] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 1392.286482] ? blkdev_put+0x85/0x520 [ 1392.290177] close_fs_devices.part.0+0x263/0x8e0 [ 1392.294916] btrfs_close_devices+0x95/0x1f0 [ 1392.299219] btrfs_mount_root+0x10b9/0x1830 [ 1392.303524] ? btrfs_decode_error+0x70/0x70 [ 1392.307830] ? __mutex_unlock_slowpath+0xea/0x610 [ 1392.312657] ? check_preemption_disabled+0x41/0x280 [ 1392.317658] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1392.322653] ? pcpu_alloc+0xc9/0x1190 [ 1392.326434] ? __lockdep_init_map+0x100/0x5a0 [ 1392.330910] mount_fs+0xa3/0x310 [ 1392.334259] vfs_kern_mount.part.0+0x68/0x470 [ 1392.338736] ? kfree+0x110/0x210 [ 1392.342083] vfs_kern_mount+0x3c/0x60 [ 1392.345877] btrfs_mount+0x23a/0xaa0 [ 1392.349584] ? btrfs_show_options+0xfd0/0xfd0 [ 1392.354057] ? __mutex_unlock_slowpath+0xea/0x610 [ 1392.358881] ? check_preemption_disabled+0x41/0x280 [ 1392.363907] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1392.368915] ? pcpu_alloc+0xc9/0x1190 [ 1392.372707] ? __lockdep_init_map+0x100/0x5a0 [ 1392.377182] mount_fs+0xa3/0x310 [ 1392.380530] vfs_kern_mount.part.0+0x68/0x470 [ 1392.385011] do_mount+0x115c/0x2f50 [ 1392.388628] ? cmp_ex_sort+0xc0/0xc0 [ 1392.392333] ? __do_page_fault+0x180/0xd60 [ 1392.396554] ? copy_mount_string+0x40/0x40 [ 1392.400776] ? memset+0x20/0x40 [ 1392.404036] ? copy_mount_options+0x26f/0x380 [ 1392.408514] ksys_mount+0xcf/0x130 [ 1392.412036] __x64_sys_mount+0xba/0x150 [ 1392.415988] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1392.420549] do_syscall_64+0xf9/0x620 [ 1392.424331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.429497] RIP: 0033:0x7fe175b4363a [ 1392.433191] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1392.452418] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1392.460103] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1392.467352] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1392.474602] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1392.481851] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1392.489105] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1392.510083] ------------[ cut here ]------------ [ 1392.514852] kernel BUG at fs/btrfs/volumes.c:1061! [ 1392.527292] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1392.532670] CPU: 0 PID: 15335 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1392.540543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.549904] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 1392.555440] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 1392.574332] RSP: 0018:ffff88805857f838 EFLAGS: 00010246 [ 1392.579691] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90005e61000 [ 1392.586942] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 1392.594197] RBP: ffff88808ff41880 R08: 0000000000000000 R09: fffffffffffff000 [ 1392.601450] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1392.608705] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880b4bcf200 [ 1392.615952] FS: 00007fe1744b7700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1392.624153] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1392.630009] CR2: 00007f820bb5c000 CR3: 00000000982e5000 CR4: 00000000003406f0 [ 1392.637258] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1392.644503] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1392.651747] Call Trace: [ 1392.654346] btrfs_close_devices+0x95/0x1f0 [ 1392.658663] btrfs_mount_root+0x10b9/0x1830 [ 1392.662974] ? btrfs_decode_error+0x70/0x70 [ 1392.667281] ? __mutex_unlock_slowpath+0xea/0x610 [ 1392.672103] ? check_preemption_disabled+0x41/0x280 [ 1392.677706] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1392.682706] ? pcpu_alloc+0xc9/0x1190 [ 1392.686488] ? __lockdep_init_map+0x100/0x5a0 [ 1392.690963] mount_fs+0xa3/0x310 [ 1392.694310] vfs_kern_mount.part.0+0x68/0x470 [ 1392.698783] ? kfree+0x110/0x210 [ 1392.702130] vfs_kern_mount+0x3c/0x60 [ 1392.705909] btrfs_mount+0x23a/0xaa0 [ 1392.709611] ? btrfs_show_options+0xfd0/0xfd0 [ 1392.714083] ? __mutex_unlock_slowpath+0xea/0x610 [ 1392.718906] ? check_preemption_disabled+0x41/0x280 [ 1392.723903] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1392.728912] ? pcpu_alloc+0xc9/0x1190 [ 1392.732705] ? __lockdep_init_map+0x100/0x5a0 [ 1392.737181] mount_fs+0xa3/0x310 [ 1392.740534] vfs_kern_mount.part.0+0x68/0x470 [ 1392.745009] do_mount+0x115c/0x2f50 [ 1392.748617] ? cmp_ex_sort+0xc0/0xc0 [ 1392.752312] ? __do_page_fault+0x180/0xd60 [ 1392.756531] ? copy_mount_string+0x40/0x40 [ 1392.760757] ? memset+0x20/0x40 [ 1392.764014] ? copy_mount_options+0x26f/0x380 [ 1392.768486] ksys_mount+0xcf/0x130 [ 1392.772005] __x64_sys_mount+0xba/0x150 [ 1392.775958] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1392.780519] do_syscall_64+0xf9/0x620 [ 1392.784301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.789467] RIP: 0033:0x7fe175b4363a [ 1392.793159] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1392.812037] RSP: 002b:00007fe1744b6f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1392.819719] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007fe175b4363a [ 1392.826976] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe1744b6fe0 [ 1392.834231] RBP: 00007fe1744b7020 R08: 00007fe1744b7020 R09: 0000000020000000 [ 1392.841478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1392.848725] R13: 0000000020000100 R14: 00007fe1744b6fe0 R15: 00000000200005c0 [ 1392.855973] Modules linked in: [ 1392.862063] ---[ end trace 3bbc1e78a3c2f44a ]--- [ 1392.866831] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 1392.873828] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 1392.892857] RSP: 0018:ffff88805857f838 EFLAGS: 00010246 [ 1392.898200] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90005e61000 [ 1392.905505] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 1392.912840] RBP: ffff88808ff41880 R08: 0000000000000000 R09: fffffffffffff000 [ 1392.920146] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1392.927431] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880b4bcf200 [ 1392.935868] FS: 00007fe1744b7700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1392.944474] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1392.950721] CR2: 00007f820bb5c000 CR3: 00000000982e5000 CR4: 00000000003406f0 [ 1392.958345] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1392.966007] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1392.974355] Kernel panic - not syncing: Fatal exception [ 1392.979870] Kernel Offset: disabled [ 1392.983482] Rebooting in 86400 seconds..