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", 0x1000}, {&(0x7f00000058c0)="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", 0x1000}, {&(0x7f00000068c0)="1632bf22851785b9264d5112b1a2c64379b4a44e6c0d6d09321e3f79bd282a012239ffc4cfa946907d5cc679da3716258acee3407c5fba6007aac99e29e10443ac236c7d62acb75537fb57f226c3f3096f9c93682622051e22d1d65b397136fd2e178a0814128d8b87d3ff4e6857e5e43db24fcc649a659c4990a1801dd47a5a789b05eb256cc251050892f7e6d271c3e8a7c38ece858c0c5952210edec41dcc238b563f83602caef4efec0f6a0193ebc9e5d4794ee7f9547f043e48673f8491672231e18d2f83f99c67109a0cc438830e1b9a3f26d06db34bd1327aaaa7619d71", 0xe1}, {&(0x7f00000069c0)="54d64d971421a44cd9c39f87ffd32ffcaa7decba5ee4e9ad08630b116aad169eb9b90ca65c01df029ee1c9009e5967519faee400e8da5f5eb06a2a277ab400910cd27b1e860695816abc6766e7dc6836210c145cb4b49641665e23e848423a053da3f97ae699d24cd054db67bc5ba7260c4dce5e538f7d7046e563f1bcca19756bd9542d9fb892e6547eb0ff0d2c584fd9498cfe774b4b01d2a5aafc92a7711608169481bd8bf24e2da67fba1220f60071687c354940680866df398fd1b8a514dfe5f14f1d8787b004edaf5511d71ebb8e139938efb736121740a167d2a2b8ffcd739b993e819cbaf4387bb9bf06a0894ee9172a8ac2320528b268b5d8b6ffcb0743b548ddbd98ee9088c9cb99e4c322e304c384c0c0ac2d2278de7efd143a0e3ca6b001b3d8a1401bca3563c292f58fecf705199e2eb9d9225fa25da3973d152b824cb5ccc1365d61d5532c8d50602bc13f63fd5e2ec8ab81a5155a241702a4d343149c1eed5ce8042a80feb97f1bbfcd768c7580ed417945fb35f2997c7d2c3d9106f5aba4a22e120c28dca661188683d9e2874bdf31500f7f7fd2380df127f820d9095a3ec42639e8ca35ca76e7ed76c2769c2c87291c2f31ea2cdd7e9e59ad29bdb430a1338ecc59e8a92c6420cc36e4031320f4e2c1213beade6c9cdf32cd1b9f210cee059e6afd24de19216f1c9a320fe529df02ba8e6f93f455c4f1c6f6103b1c331db919d89976515d9c45ce5194500e9affcb76b2ad54ec57ef24468210b2b874add0162fb664a763d18d88f536fb3006f120097fa05c9c86f47482be6ff1a181afc8c69e5ae3b0783dd663e698359786ff3ce005c373c43c7841b4020fd7781e037ba26e202d152e5413ac21c0fd7380089b654b103ceaacd01ed479da1ce87660f0e05a0efbd44c01ce1dda2192eecf0b0352993d34a391a6f22559fef7688de1619c0c77e567aea04312340d7c8ebef17f2a845cd11377057c25916f3d5d36ffd3fa700b99a68884a4aaa67b871143ad1179742f4aa57345da8ca58a11a3cbb3da373fd13af80bc5ecb87c5919176c57f0d84314f9b7868a3777332eb4cd701b2d2f600e29a5144cc5632e7246855d9b2520f81129470902b024b342e36d9621afd063610266c375abb2591c48a16faabfe757d11d364a1cd15bfc91cf39b1a2ab1542fa5a1ba3267ec36cd69a7c63b4b5f178060fbb677808dea79be113541eedcc69ce8e0ca9ff9b25b8c5949738ca319d1a4d9e2a2968624f53d1c1b04b2248b62f8173fe7da15f0acc7ef4bb16303a123ffd6b9e6b8917f9a027d65eb005696427ec69c1f4f1d2b465bdfc5697558de34222d10a7eb144175649a99a7b1bd98455045b8b9392c5499b1de4be4a777818f5a6fe332306b1e23cad7032b6e5dc23869d0cf1068ccc5d6587125d83fd03eab6bfa37306fcece5d855637455307e29c00e49c42e6d78ad3aaacbe0549a375d614a3b0724b3a5728cec267727912af179e1ba55ac2acee708b756046178e2d10c4e406f03a3a878cdf93d5590754929e47baf3758b9396c8d0b76f919b45c3a84d5efb0e094ec74d4a7f3ce991dcd8d8aef586c58ac465a73f7aa7b1320949f79bdbbe6fccd451e356b7d084509e160547ef402fcb7f158864f01c7a26c2cc8568c1ef9f3f2231e7abe20756adff6d86c22aee4dc42edfd91d6be5c5dede66e279ab1a53a35a6d4c43d351a5912f8fc036f38ff5e915e66d753bc29a31680259491ef085bb1673e24b8065b1e3a57d327f17a4a35f1238c03ce9b3f3eb9377660bb409e97f9b2255c5def9f3fe49a10619b2652144a0e21f255e32266d55b02869222c1c9aa92091d780701e02895a869faf1c38cc95e4ced13fd6a24380b9f21c4862e9b86b673721a5b21b83caf22a247474b34ef5b24d2e710aaad804d8c3ede3335c290316d9b42d9e71547e3bd49ae7b04fca5f71ae71a2c5169bf3ec59eb337626e09d1fa9d5664409dc3f0f8017c247f5ca7809f3a7e0dedb305f0383172b53f1ecd12ede95588b36a4e816ec3b0a7c12071b58ff5153a842920d06fdf7bde155ce521949973e9127b4bb94f3db6a65ba4d65a5e9a58d46ee58ab01249a29a6268c1e1b1389804084cebcdb0a608906da9bbbc33bc18741c8c584c96d09390e6d44ceac4b3da2d4c45a71e5f62ca7d34906aad18e259b487f5ccc7dc3333a5a4035961646a9bef5f3d3f59b007e21db5538ef42e260136527858418a4e672d14c93dab9af95e46b34f015c913c2eb58dba67e41bfa8478de1fbb2766e146ba4d4721d4347a365c66db2baa0e9b87a261a33a3e6c1766232e814da4440884b59fb7a21883060d9153e294b0b7a65909e38c3df0dab2f35bc6b98094fd4641eb272205204d9878d39d62fc2ed4b4e1a90ef9583aa0f9604fa267c6890643b26088560ce68937e9e3d3a2f7ad5b5e37e736c2a33f948b43eefd320fea330df99da329eaf590ca18611a77c6eb04913ea49619591968003a60a77578b3243cc501835fcdda36f1dd8edffc8230b8b97e776c29c14a7c9a71378b392b1545f9146fb86a363e715517740e99edc9cb4b6b33043661bf39b827c59375be65ed41f6ea7967bbcd18e62c5d558dcf2b697cc8b16205edc9af68959e846c8777bd4d7dcc4d866d8c4179ea23b8c3b9cc89010798cf975642c6895e58c23b362e30a0be496c0c35445be41f67035616f50d3ffa48416815ee06970477b68ced33d27c2d87a46a42b162f40d15130369a237448d8c1f177e2af234a923811eaf896db3e7176b9e2ac5d5e2d24764e94b84d2b4beb65d2d4e27cda3643a4d92e0bd4c0f95995640949ddcebf0848bc02308ebaf3279fa4aa989300ed705141f67ff1d76477dc3642c4703bd89edcaf5f7e676d4e48622f5145ccf4c2c61b8ffcdf10f349894d3514a55e3ef8483b2d6f37b53fca06f148ec595d9ca2a8659994a00126de6cd9bc51812f7d1bd30117e436f0cf5d164933424ee8a315b49e9aed966fcfc0cae85aff0b17c8996e1e32b8ae6da88cab15db734856e9b2d7119848b95ffbca7ac9b28f9baac6279bd960294e73512be749cfb00646b5d1b71df5b98a143746d0e117e13b0e764ddb7c7b7e97f700032ba410b4f5eace76cec34cf2acf837dfedbd441ebb2a4299010feadc8be25f55548baa5dc97dd3b0500c8b18e908d57695e6d0045d22edb35b71ce1439763a518792594306e50d046b63d0c55204f2d9a5a9cff6af622a8e27568114e3cb3fe2055761c9ecc41630d2c55917efd2a29356cdd2edb9d93b82f0003afac294f471cce577691dee126dd81b6c2c026894d9a4398fe84555ff12c44fd20844e9150127ce7f5df8013323264a58a3267acd1f755c3600e5be067bf3a466cde921f7a7379d747f96c4beec1211b0f41d0e0eef7821c94f6a5da860f3b0b064d57e16beface3fde73273d4270c33556782282cfc37db57c8194b98ba71feaf87011d0b26cf14ff48c2197d0261244f2fa7ccedcd7f40ae9891d7960b25b0ee9bb3d18b16ce722a83b23c0282534b34dbf85fe33ec255f0ea377cfca20857dfa79bcf879fabc683ee4b693253eb440a151514912cbde4684593625ee55abaa6ae8c64dcbaba711a295d2bcbcb6493189abbf09a168bf3a1e173af13aa7215a11551b2e9df939a2b56a941f7f37c93e36cf938e5e1730eeb146dc9d1ab6942d9caacd5bcc6948e4287b46437f74163651fa1c5d9cdd6e0143ce33e9d20fc5a9d71a93c91581a4ad7bddea70cc87739145deec7b80f46cb229cdc5bcf7173f70e8b94cd815e0c11e129d070040d68d4550660c4c7388a71fb0fdf043004398b76c57478fa90906c0046524aa6e2a41fd81583fd2abaac7f04b0c54caf5ee68dae36092f969e2b377434072c050824aa3b849b707838b1f66be53014b5c01855e01c110b1e57dbbd55555594986e8264f080ea103c95b12ada33d6b046ea1ba32e898516464c6ec934c6f17bcf4a1a2ae575320963b78efb5ccdce86bcdbca115bd6bfb045e3d131d038beaeb4147324a331a3a91c474d93e0fd848477af105ed67bd09e515f07073f5a653d1088e87597fa19da70166293f939a95d47ac6052b1a2d2a0e52e44f37fe17d464bc9758dd99a9bd271fe354826755197d60ccc26e63dad36e38667bd5c007e0339512835b83514e167c5f70a953689c29c490a8859a498b0d7442080517c23123695aac4bdde7245705054f17a5b27ba09e02811fe6b35fe70a492f37870fcb30dd07af5ce7e16f82619bbbf2e1a0f8e3b41132af79265065f251baede9e58043cc1f46ebd63453e07553332866fa0ee4f096c31ebf29ef6360caab1729d4c53b2a80e6ad2d55672e3c68c1d61c59e8886f4fb08c59946be1f312ab87e0e09d0091027feed5436a3ee0738c11b07b4bb51bd6c52cb3f012a49c70ed1822c66b7d863f41a73ec9061cb0f436f4dd3bdc3236a428e24245ef6942b877dbd57657529ab4078ed6c926cb67122e5d4f39091f1bddf17a32a4c85b20598609ecfb7498a539fb093df759317579553d1c9ca4faea3930200650bd0a8fb5339914a9bc1baddac70a7fb69717eae2535bd34bbc13232f04735671a039d8a9a2bae5902338381193d6eed33ed0eb76fb49055cccb2581c88980634c9757322a9ce9fe8b149ba416683158572d3fea9717bebea28908764c6b3431db3fce98c23379d9ba46d0f42845466fefc9b1e28bae6138e9fcb29835bca0dc04ec110efe015169f2a390aa9e368c6009bff6d128969daf23bf912165071afe5f54fbc9c58e17719c4c29d3225dd2b54f3dc0faf1e80458dcada1f30722a4f802d6ad39d877363e4e8c0e3d942704562ec2ae2326e34b8bde2151f3bd9b4fad1dd85088a2f21e93a245a664e1824846d468cc0098795d23542ef99ab2762c637ec7f21e5ed5ad3607dad797192bfc1a3f7be70b8f4d733ba7e26e1a305e12799b4f9fc2a1a4163b7b068aa7c0c9e1d13a8c01d2d3c1a100f0d9404fa7007a1c2316747574cbb50e59051d4db681be9544b35d4e3dc0d372c1285da52c6f0cc9082f725f6ae894e2d0d81fb23a0a49a6764b9022893c8ea093c326f90527b17c6d606d43d6041f5eebf7cd2d8e033bb7d42b06ccce2d1c60f72ee5a3d596c9f26768e412800634f6b360808590226a603c67aa2ffc4bfdb75fec5696050e4f71ac864a6aac648551ac8f55af5ed9f7fa6be69d3a563a3dd4c6d48109455ac04b144ef4d9dca5f2555ce73178f2aaf085500ce0884abdf9d34ff30313b7adc249711d30dbd11aa5c3da2c92edb52562bcc54ad6358eaba86afa2b451a253d4f5b10d4a66e884ca4d8b1d08dae921dcaa5e652c1c2a87697a7cc6dc46abe64f42e56ec919a33719158497a2ce0003be0f0af3a6d0ac94695805d08a8b04fb7e6ca65edaeb088cf0b6e347b060a16d46b763a87de9795271d4fa3020b0ffa6f7263aa14d62b4e389591d4164540367414e4697b18dcf86659eb29107896b60e66874f2b5e3168b72ca87492d2fb0b06ef2120a6537c293fc4d680bcd6cdf1c554469f0bff6c627624b8fd2fe07fdb4c7d3e3a5d69d5190d9c6f4e5f288b6cfeb5fce77cf59c3ca7a33078567f2040d1bbca0a0b201c6f7a541614ed0997800da94fd94cd6a517612e961f78c725708a631187311822c3d67382717b2099105a1e65937383afadc4eaf7f70868da412a947d1dbff7cd52d4d882fa02c44b4ae2cbe87e36da63b4c60a3aec73d2a6ed07aac89723ec29149095e58743", 0x1000}, {&(0x7f00000079c0)="2c9e5eb7a159ccdf767d9c5a359fc1dc4cd126464cf83efefb0bb251a2953668294e07c6da497f3cab6399562eaaccd8dc40aceface7a9ecf038866a1566ec41b09037fbddf18ca7ae75b2f1475e2f1775a3ab3bac7a9b", 0x57}, {&(0x7f0000007a40)="edd0d138ff6b18cff7519206bd65bd2294af9f6f10d83a6bca922f2e89a9f116b77b2428e6a68cc8eb9f", 0x2a}, {&(0x7f0000007a80)="d9396b88661b8cb78fa7b58a27ed48c3c959089a5e5efa54b70ac32232ef1da022a3700876947399baea6de6b7837bd2f115188e82760ecd33bffb0f98d19c", 0x3f}, {&(0x7f0000007ac0)="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", 0x1000}], 0xa, &(0x7f0000008b80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x406}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fff}}], 0x48}}, {{0x0, 0x0, &(0x7f0000008d00)=[{&(0x7f0000008c00)="627fc8263a3b58d4c49535a30b11e8f97e75be5ebbecb94bf9b1e92886002ec82c03c2a22505cd879aed76e07f6b22fba1366e88bd07f771a073f0c339983b9f2eab81270b0c3b452b3aff5ff3032d974e90593ebb77977261ae21c9a30042db8d73de95990b1849eeec3e82feb213a834b68725ef48bc68003bd6f8c74ab2c5d4d3114e02fcd48a41b38dd7d352c0d44eb4340435af7c29161f59a9ffe2816176a4b0d8cfe22ee1471955d8f83fce768d494331b7b5a4e59e78555738328462e847c3852f023da8008705a7da19d0580e48f14eae2500d7c29b578866b7ced52c9fa5928b33e44eaa81c3bfba7c92605c06eeba2c70", 0xf6}], 0x1, &(0x7f0000008f00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x1e}, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast, @dev={0xac, 0x14, 0x14, 0x14}}}}, @ip_retopts={{0x30, 0x0, 0x7, {[@ra={0x94, 0x6}, @timestamp={0x44, 0x10, 0x8, 0x0, 0x2, [{[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x9a}, {[], 0x7}]}, @ra={0x94, 0x6, 0x5e}, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast1, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7814}}], 0x128}}, {{&(0x7f0000009040)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000009100)=[{&(0x7f0000009080)="7d2025a942a91d8f637d7e2f7ae4b120090e8d4ecc700817184085fc3fd97739a72d9a6c668c8b817ed9c6dc11bd8fa5329b7ab26b9b67b2441bf0ad28231b37b20d543384b7957a12f215b7d8b42a7409eb82386f0cedb47fb1a890ccd3b03a11e860104e4b915043fe30a3", 0x6c}], 0x1, &(0x7f00000091c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x28, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x3d5a3f10, [@rand_addr=0x400000000000]}, @timestamp={0x44, 0x10, 0x6, 0x3, 0x8, [{[@broadcast], 0x5e85}, {[], 0x5}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @rand_addr=0x7, @rand_addr=0x3}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8f54}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x36b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0xcc53}}], 0x108}}, {{0x0, 0x0, &(0x7f0000009480)=[{&(0x7f0000009300)="38ecee29d6780129b7431499ea9e941047a2c965dfd64506ed5b5484c60e12e7c5a8cfa30bb235b69fd3fadd710ec925c43753cadd15580e8edb730d326e4dfa3d5fdd4152277b1015f33e215bb2990c149a4a34a592955e01f3fe6694556e885dafd449897f5efa096bdf19ef8afb8dc6441f38e29aef545203b377bae8e716f625ab209c0d7995ac86c702488995f46c336a742cd447c222b254f3ea17f73a693bac43a8e3063642427fdae3d2fbf1fb1a4f7e59ce478dc05e480c20358fe6396442a6e00ddeae086fe9741d9bd5df08bb730808f8f60107412b174ca184011dd8b4ef5a4b66e5ab386cdd66d050727a295f398290", 0xf6}, {&(0x7f0000009400)="625136a9460084265c7f40f9928f878e722047e17e22ce294162eacc28bd421d8558de6ac577c0b5348b402b6c3ff365f7110b25375a542245a05093ad0d4f0124ee51a73d4ae7fe331f8af7573d529d4fc281a3294747e5399e07b223a103ae176a7b074a3099d5379f9405cde956a76d711e8c", 0x74}], 0x2, &(0x7f0000009540)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x485f46f5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @empty, @dev={0xac, 0x14, 0x14, 0x17}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0x50}}, {{&(0x7f00000095c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000009980)=[{&(0x7f0000009600)="65dafd6ade5a6562471e9caecfe44e9e585fbbbb60b64c6b5c1b4208dfaf9a0126e99b1a3efa6f306c3083da778aa741d6846bb64f09e0b16eba7fa292ae121baf26891d2315dd988dc24c0631ce203aefa2d37cf311cf33764998b353687e47c01d147e39b48e99919860859dbc4e9c70c767e0705eee10b75b04afd96d33d064e538603ffe", 0x86}, {&(0x7f00000096c0)="ec8978725a4f3de4f4bc4ac7c9cf4e5bb41e8716c8e99373babcf22753a17a49e5f94a406fdda6f0d0518d56374cefba731f8033d463757fb44d5846c2b055199c5b773c9e9c7e6b4bd3d7b2fcf2372d9e255cc076901f04fc6f9916a706e7fc70631ba3e9a93b7617ee68a43e99dc4e5f208bd47fb8f6ac628a342963721415160808cba6531d18fa38fe5ddcc0f9b7b5a6f95ea32dd71eb759c42640d03bf558a9", 0xa2}, {&(0x7f0000009780)="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", 0xff}, {&(0x7f0000009880)="9018fa06ee9c2e77794bc340e7ab60a65c76df0979c7d2835167c8e8f2a3a791bd6d863e68f57988242e340a0a4d838919ed60c80635d950e64b32cb9a907d6928d8b139cc0bde48ce477b1a4369a40ec1b122eacf4db32ddf52fbf62491213ab21406c5792f0b41c62a2fcdbb7c67256252780a557f03a31ba62d20747161394c5cc7cd7952661d7fb6607a012fbdc289383348e5e3121be221cf07ddf55c209e9f61c83eed863689728c1bb7f5662315d79d3769ea564307a308ce6bfc05c3bca8f406029e1163cc8d0e09108bf43ade890474c55f7f42941e9298d02c696571e341bfc305567ab02416dadb29e8062067a6abfb", 0xf5}], 0x4, &(0x7f00000099c0)=[@ip_retopts={{0x30, 0x0, 0x7, {[@noop, @rr={0x7, 0x13, 0x20, [@rand_addr=0x8000, @multicast1, @local, @remote]}, @rr={0x7, 0xb, 0x6, [@broadcast, @empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x60}}], 0xa, 0x80) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000010000107000000000000000003000000a52525bf039c87a1ca000100003a66e53c151d1448d2fdd9a72eaf8c3ce17590ad0f2a0de3daccf81384c97dd9d80f666fffca9f5bfe4b1616fa3ad49d6ec85152a1dd19b9853b32288110c53952dbf7e8431e2087e8ca7ae7cb8a5b054dd51587332f500aff8d65a9278c28f5fb9041aa57aad769cefd74f7c3744623e2a40fca7aadfeeeb3e87e94981ea2da8675550f0026e4c1ac6dc2b6f7e50a300e79790e6ccf25aef2"], 0x14}}, 0x0) r10 = perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x97d9f196de230c8b, 0x0, 0x0, 0x0, 0x4a}}], 0x4000000000001a0, 0x2, 0x0) r11 = fcntl$getown(r10, 0x9) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x0, r11}) 15:17:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003180)={'vcan0\x00', 0x0}) getsockname(r0, &(0x7f0000003480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003500)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003540)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000008d40)={@initdev, @multicast1, 0x0}, &(0x7f0000008d80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000008dc0)={@local, @empty, 0x0}, &(0x7f0000008e00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008e40)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000008e80)={@local, 0x0}, &(0x7f0000008ec0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000009140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000094c0)={@empty, 0x0}, &(0x7f0000009500)=0x14) sendmmsg$inet(r0, &(0x7f0000009a40)=[{{&(0x7f0000000140)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="6ab45b0aef16b8e964ef6b01dd14bb106a73d3ed3929ceac0cd54cdec51278fac3e3d61946fe81acf7cc3e05e385b627607b1e34db7fe4ea54fc6f15d614708ff202", 0x42}, {&(0x7f0000000240)="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", 0xfe}, {&(0x7f0000000340)="ecd7604e55c4c09f7181a31c752beb0e9cba4d1a3616172b2632562f4cc171f15fe12b46c7443591cf65c32f4f7a90748889277dfa05b0198a671997c0b485a86bac4659c8a3500f33e3b055ab2b4762fb8f975ea2de6901f278eea15528221037bc47439fd9a12ffb7bd2c809e6da672ffd9343df59cb88908f5c6666d30ae29683abe13a88af6654eb04d5f4e1c4dcd7b4cdf866962b7de6d903437ffa457e6302a2af1df60782c7c25573a8537a269473aa67c2a9cbe1dae5f5a3a83150c1ba85259c218b2ce4faf989f2118ff5ebd901c53c81efaf1c52f722d04bbf7ae9eb60a94b6d7b0a530ead5454ba44cd943da5", 0xf2}, {&(0x7f0000000440)="b1c9ac6af7dfdb4aabf6dca2df5fc5e244ff912fc64abd2c8b48477c368e2d5b87be71e1db36ff266542a4f700aab81c132ad23c91a62a1c86ea3f9e6cb678248c56ae8c924999499579112180566683de8a6740eae238cc9c336993c0a8b56e9fb7c19f25e62055a954ef81aa76759dd0420ed8f00b91708ec26c288278b28c129f58f064c54b57d52b366c1383413acbc10cc5afc6b75422e45927203bd7f4d2b6bbc309ac9d49793f7833d2c2b89e8af1", 0xb2}], 0x4, &(0x7f0000000540)=[@ip_retopts={{0x60, 0x0, 0x7, {[@ssrr={0x89, 0x17, 0x0, [@multicast2, @rand_addr=0x1, @multicast1, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x38, 0x1bf0, 0x1, 0x0, [{[@broadcast], 0x800}, {[@rand_addr=0x8], 0x2}, {[@empty], 0x7}, {[], 0xc14cf23}, {[], 0x6}, {[], 0x523}, {[], 0xfffffffffffffffe}, {[], 0x3}, {[], 0xec29}, {[], 0x90000000000}]}]}}}], 0x60}}, {{&(0x7f00000005c0)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000780)="0427347dd009781f184cdef8aa65b54375bba5137abc80730de412703f209ddeb6649953c456e0b3c382a0d08f2040f30efe7a2e3f284342415c4c41b7f0aacec5ac8bb4fb68412e1f5852e27f214d54c840f6c1a36fbdb39314c6e74ab4bf94917e46ebe44b73df46866bdacb50066d79047b45e2ea9f735f57c891dc3b07ca306597078ce4c5d14d018a0bc590ada67b4289f737c20f089767d954d944acfbca917fe51b45ae667e2f8cf4340b7c2095b717db664c3972bd17c11fc6f18771439bc14272", 0xc5}, {&(0x7f0000000880)="30ce8b32518beeec9f43eb83083b918bfe3c8702e28b10da42afb79e86b3ac191eaf24d8f2998bd0cb224f3be98d86e15ef2849dd330d358e5cd9d66e539303d3b519fed338bb5b81172a33fd1dfb7cc74d290ac8de80bc64a276c6fbfe4b3604e5790084ce200fca498a998e4f31c2a70f00de9180b56ce216a8638a02104794168c28fe5aff15487e1c0b68638f9e7593cdf3d211d8d04ccedcc4c702f01074dddaa3ff96b3515fa145dd0522436551812239f435e10af23e7a43306", 0xbd}, {&(0x7f0000000940)="93b4001d805de57d3fce35d91664d4d063be8f4c77ee1326580754294f2727d454ef3c048a45582f3d045c40f1e0f4741ed351714e5b2bb8f88a8ace962a55e50f07910197f9c34a2ae125b38e5568801f1983e423b0c4909df54ab2173f0aef7e78ae9cb14a11c2005b416cbe91cb75d2070099d1674d085ff72347895776a9c0b9db9e71", 0x85}], 0x3}}, {{&(0x7f00000006c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000001a80)=[{&(0x7f0000000700)}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="69defe75b77dea19fe686f39c55fa8e8e052efe2e4dfec9f9090212d135add3ed2a69a30fed8c5df74c01a34e29426b8caf175a4e92ad397fd21fefec6e32322cb7715daa876ab4a4aa01733918f90070c1db5d2ee27552631fd1990350e05ca8e0d858d607fdc999ab6dd23593a447fbcca", 0x72}], 0x3}}, {{&(0x7f0000001ac0)={0x2, 0x4e22, @rand_addr=0x2}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001b00)="50551da115cfe7702cb8f28d2963202e782d2e8a007a305b8e5ae74541a91ae976194f74881303e8638a54db325aad3bc2a003dcda4d38359a9ddb0dd42a6303d604d40d2ff072ab430b4aeb66f9e378002878ad71871632664c9d8c5a2b0aba1156f045934b429574feaa0169", 0x6d}, {&(0x7f0000001b80)="c78a0fa9d614c5601fb1a2a64ba57824aca5dc1df74acafbafc4e0d9bb82a03e90613c1c9245b53a152aa710de448c280581a05817509c4aa3f121fa9e821b1b98bd866d659be7caad5197ee959443b93bdb72e3bd516df8ea263a2dc8775570ca0ae0475ab8edac38c9919b050ee02b0c86857707348d41a36a025f6088c50eb124e1fb604011d56ce449a79cc427d683ae85715295d8c299dea5872938417427b7d46d0671e973f74e63124316ef1d6e172adac2371cf9d81af37df4a4d6709c65bb53842669e54333cc914e8c4000a3cecb", 0xd3}], 0x2, &(0x7f0000003580)=[@ip_retopts={{0x8c, 0x0, 0x7, {[@cipso={0x86, 0x53, 0x5, [{0x7, 0x11, "1abdf11a6b95df8119161b870dfa18"}, {0x2, 0xa, "9765523651e495f9"}, {0x2, 0xf, "84830101e1402521ec9724ef89"}, {0x0, 0x9, "dfad17465f64e8"}, {0x5, 0x9, "87d02d3b12fc02"}, {0x5, 0xc, "ff71463b888f322ea59c"}, {0x0, 0x5, "ad0066"}]}, @ssrr={0x89, 0x13, 0xc21c, [@remote, @empty, @rand_addr, @broadcast]}, @ra={0x94, 0x6, 0x5}, @end, @lsrr={0x83, 0x7, 0x1, [@loopback]}, @noop, @ra={0x94, 0x6, 0x3f}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast1, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @multicast2, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}], 0x120}}, {{&(0x7f00000036c0)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f00000037c0)=[{&(0x7f0000003700)="45f485eb9ddca6fc503b5aae48200eb01f23520ed7dd333cee61e38d9a01cad6ae3b23c0a2d6b4d77a4a3669bdf2f94ec598ff921a19a20bdf7a939029eaf50215a4ac88261c8d5aaf56e9132be07d7ef095db4027c5d8763f0c8ba1046a567ea9b928552030c15d4a75a018219ab4bc052c6910d7399939b820061f1b206385a57daf6a432b8db613cca4f2ed92b130f190aa25fdce075e405b9543af546d1109e2b7", 0xa3}], 0x1}}, {{&(0x7f0000003800)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000008ac0)=[{&(0x7f0000003840)="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", 0x1000}, {&(0x7f0000004840)="474fd044a532ce151014a864b07ed891b93c6080f3a844a83e513c2c428f00cf8b11755fcc2c6412149eea77acb109935fbc45f1606c1d2cd89c0315654b85b9ed22e92b8ffef84fd659d78dcd45a33443a24354032fa007fbe9345b91b14bb7744479689ec4c12a26e09941b4d9b95ef184eea26099b4", 0x77}, {&(0x7f00000048c0)="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", 0x1000}, {&(0x7f00000058c0)="c0741059e3211a4768260902073562c3a88717818ed9f475d1f7a07c11ed4be812ee8ce9ad6c42788013ce874337cb056a521b9869c03d06861af5a910a3aed35d128536c2e81a0f1db7f1b776135a65be6b127d3a05787e2bb9a9dfa3246933f487cd302195297bebf7e3ad9af8eaa169aaafb5ac9fb3dd0a0554b5cfd861c15b7feeb945fc7ffad7e7f7766809e0ee5323ce33c1cd797588c14a77e8881e6b0f9d4af76aed9301c3c4244eebaffaf7a1adf7b86661153d3b8a869175a6c7b925213b8da163d955fb5b96bd693291487edc8423e8825b7b6cbed75c8a5510a4488974bdac2d40363e6a780d10e1876a5f1a23da112c40a4058e4c02ed344b88a3683619da415509787fb4c80cfd062af363739b56454eb65466d4b2f453ad252b1de6537407b2427dcf53d34d8db8a71b69582fc842db3cdb75d846c8a2ec86d4cd809504c6f4462792fe4a9a0be028e8247a9a97643285763ce1fec1b25246d0ea2ea1b89a931620757ef1a605f145dbe318320cfc18bfac9366e6a7ccf2fb816104bfce1f7947123f10a6d411f7f79e1e738e7cc62630d36a89c972e2e7825fb52408538d1905617931fe1ee1b11b09e8ef1e3f44f023b3ea0553717a92cac1ffbb024b34d662e9d2c1f500f3c66d60885752e727db3a39ddb58f56dc2a93faf30a225ceffeb329b39d7c4ff7088eb380b634992c221b07299a2a5d655215a48a10701ad7b228e848807ea938c9443807c582dd387217911f9ee29d0aca66c1c3840407c5d7a1ba2c44aaf6a4571293ebb4ccc65ad4e430a70edfcdef73ff640e2e2b30ac3e0749924b4d7b502fdce88f71bf5c004896c3d7f35593a549a19df87d5dbcb1ab9aac803fe9342376facde86bbc7bac0f640dc0f28fdef2ed043468cdc69f4f7599d37b1ba91e73d25c4d9dfa6d800c26ff6108e8204982e4550a2354367796d643e8c522ffddcd48a5ee72325e0dcb0b44bf0b58d5238815a6a3d61811b368c0db1b9798a04b5b1bfc7570b467a2ff12e0673d8790ce61b422ed4f419c4e6721b22130541d9936cb7eb7c927cbefd5648774742a86056e62172bfe7821222c2de6e02b7786d9575df4c39b4377d22f15eeb36fdaf52570f1ee65749566e5b78d6d7327dd08142e52494346e66c86634144609288cf000648a09c08a960fa0790134fa9b51fc15459d21a88e93f587050449696943881c7d9d3441fa84b01b10ac01677a0005299d03d051094d3a30a68ff008032333ce148a218b43be0c32def8d3361943f1c9799096d8c9796097b8b510eabc1e34c0af9a72ace32ff3474534e925f53832c2aabcc7984beeb9aa91c4d80c9c3e3b12f1318901c14eaf9a0e22cba3dfdffda14cdf08abc09250ecc286d6f817d3f6d3d579d5e7a3083871b46242078e35ba1c659534061ddbe637498f51daafac60080b82a33dbd17b5908dbc600a5724968b6896bff1b1cb8661250e1d0e57fe9006c221ef47e9e8faca992fec07464dae9ebdd5276bdc67c8ec0f1c74b28b733e43fc24d3c4d68425c84166bf7fd0ed8c60895fc20523d438d1d23983ce9d31384136afe5d2af903160b99388d16153d714b0b12da0aa1868473c99be0b45a3d0a1c0092008a159b997bab222c452a29d894f3dc8dcc80023a981220344240612f9097fe179bb7c8434883d4e45af93d347be6e2369c8d8fff7c0b162585b4e62876cc48c5f6e27a9d4644c8cdbfb2f7062829e101fcd88f970905efedaccddcf1c81802595883a8748466fbe88a2a9bb23f9aa53b58e8b190ad1aa82d08992dde861b63769598545439b780ba3faad7934826a79d663adf47644c9ad2587b95d17d5d2d42182dd02026ee6b796886cb451c68988fa9e5408ebe8afa3c4805333c9e0ecba1b85a14e4af7313f79f465069b0be791764195818c10b8adf22841446291fc1fa99745f6fbb0303c4b46fac6be2082e9aa1a1cb332cf94ca8680c3aad623971866f70873d12e03cc2bebc6f6c5d6543d8e7f69bfedabf0cb5b4152a30203490e5372d7b09cbab61c9ea6101b68962b18600da1039938d196b78937b040d4f2a01dee78f41093d218ec6850780f9b3d15959ca85840545444800f3efd84fca41953cdc9cbd8696395181ecea748bd1868ef0ee8c2400d575a7a96d76a6ace7c4736d581c25e3fbac07808bc557895295e7358132fe7186384a7d225c06a761b6c3b1513480299107d7cf5856aa9f6ee7ea4b3e3b9c49935decf7a8f3099cb9c613bf2c6d5cd5e3aa721fa4a6f996f14e2d7f76bd897ca490bef26647d022dbf255e8df7261f3870c30516beccbd0951fdd1651da72bf9dd3e9439d70188e01fcac38304d74c52abac00d42f5258bb5b02e4cecfe482fd92c657af1a1ae2faaa291412a53201446b609c48ddb32c51c55e3227bba982c63e84b9cfde6152087c0dc7f04f11bd2cc1a3080b604c6101f2934a3646b020aa41ed6e8048f24808cb45b6ef563003028728a7329cb83cc2b580e163e1634d0a7cb7b91e31b7a0b89e82146b931d5a7d5b9cfa1e7a2f28c8e1e6001fd579931fa2132bc67b43b23d2188bcaaf1e79423954f7fd752984308862b29c41e83d85187eb3a4ac491ec3a2c73f6df4b2bf03447be716935a33a341f41ffb70bd1a767e10b20b4c832c15f968e3c5d4cbf641fd5fd068cafa8ff6c978588fc826d7ae8d5a65abe73d6928fed7380ae67200602b163c6f0ee28c812690a59279bf0cfebf6602c5407f93335757698960d1aebb43d1cbabca5b516da8c107aa9942142c9e25d98ed8d405528716ee5781ea759c30279dbb4969c91e4e21617e4b371e141e74823dba64670082a599a52aa27ee34767dc925771ed8ac4649b520af33ebf3cdd279f9d5aebb85c118f3c9148e1e03170b6dd9399a4ddbd10e9fc56f2c562c04032631cecaf41b790fc48903e60d75288e8b7c4e7aeeff52b72564f3424bf878154eaed4e794e721e9f8e39fe6fd4bf6a009f8e20d5f04930b82efa18b39578ec25558d39071a68b562771896a1162385913ed0a40c7faae19d65f7d23d7d7947ddf2c4d0a1f1ad8d29a9c3484f68b5652abd0192ddd80fe923764583bc93be170ee462187f45473a50d2ffd595efa93186a76c3a15858284d6e046e94d534b01c331f29b7e2d5ffeaae71cfa359c38ce77457aa3a59a72642d4031f3aa1270196b3a2b62f7ca1afb5a91ccc0fc49cedf81c532dff01cb0b1f186a472d2570face1ce3406a0982c55a5c5a52a08847646a2b47bd020080d40330af62a7445c97c0db3c4a9ba2b9d998fedee71c4917cf1c0e967e3fdcf6aeb3361b4934905f52870ec47e8673aa3519a67ba50644d3112f57eb5711aa4a68034dea56ece16a03afce3ba092b5ed96b767160cfc0884f488d0cf77fc69638c9b660ceb2c89b385542f8f20cc8df9736ab4d84711576d17045521c49012a535f296b9201ce68e6680ad60620557f9f4f5717290586000fa52ea13f96bbc13a6635c18f1a4c13005b3dd32a994f0fed6649abab3c2b4bb21b6a8d2b829247a5b78d730df3a8c3f69d7a5f82e4cba471aa6e14b33154d529ac897a1db7e31e5abf8ed351d8bfbcb0d1a4c245c61347741a3a5257532d1528db57ac2a8673495934ff3f07ba56a7aa50d57a898123a71efc97b5f56cc6a46d6638571c8dc7094dff17db250c86e306ff2e7a4dcfe37f7504915e043277906dd2bbc85d34722c9e3fa3a45bf810a12b58b193d8a12977b636bcc626874e008756188f7d5fe6e86ec267cd64253180c881aba9f9a7c07d273511469e2f891a24200d06e0a0fcbe0a0a8cfb81a8309cf8255b32a095977348f3ee626a02d58dd2e60799f7db109eb0587d5130dc9affec34fbbcda46b024769ddd4e5730316f9992990e783618faf08acb417ee8b9a4928f0e2f5ecd733fd4cf6150bb5d5c5d29205a7bf160bcdb8d9420b4976fc512ed3791ec929dfd2b58ab918ea8e6c868ee367811fc5b4c95cb4afa803ca5a67917ec0d4a47a8b3d247041b1c393d568e7622954f1d2e1b950c4c3dc8a9a07f37bed9a163ba1457e104a791e49b225555c288c5615a3deb9430668a35d0d78a873d4fa1f0cefecc9f81440449cf637d87e8cd0c2d63f8a936b7ea41b3f09bcd187d950adc39378b8482feb0553f29b7ae71886b138df6772b695a97c6dae8347f43950d55ee48da9f0fa571474be6f661afeda311a3bb3a3ef37dd193d0381875c8cfcac2a2223ae90a27cadd21f064e9487a41f33ba1dde9ed2cfdac001fcc6ac5db8a8c1a4116b0309cd84fb2935f8b15d7e22b7860f8c79ffe3af35289c642c633f7619b46e05c2ae4ac49b91e70d5b81cd8d0824e5e37918e6c21a8f4f9c8c42b0aa2aa4c6a39fb14f6a6bd67f05995817a39ccdaf0598ad4772910e2014c2cf0811734e9d38d3f7a60f0fafe76a8e34753bf1a9d32b2a1937be2bc5ade0527674a0a286e855fae6bb9e288feedb36294fbcb76414726d381830c03250b28d7bd4796ae87a0c8334f9f361fb73f3a7fb5ec276a0141d8839adad562c60cbeada003b8e27075ec2ffab99cf95179a251ff5d6b89617479dfb249cd3f5b8821b961807cb2cc33f074b043f71b1f39a0cce05e4722890ba9ac71f42e0353712c6bf4243a9bfc1e041fff739cdc893af08bd3e26b2c17ff20babd9759f8e23057b0700982c010d341ba8d61a4f527169929cdcdee3dace590b4a836dd26531e5d0ab4d8b3173272d4d56fdcc351da64925a5d3982d9c2465ac4c756748f770c83e9a4b0d9064019c528eb2533866c3f2a6d866c7378f0c56022602ff860c01163e07433e65d18c88a5d332123c985c3cc3ba0784765740450aaa8ecf6872f78049f6fdf43742a148f2bee9dbd4a59b4814a6c0d65c5ca1cac14701749d79feefe132118a63bc1e34680157e75f7b71bce4672015ef6ce05a653ba2f897383d9b6f1f3ef2b695600f6bee3fc1830bde370efc68ee4755b03ebdab6633492e838b635d6bd987fad0e8da85cc73457ba01e3b5d607b1301227875fb6c64e8410097e859828d1b307b60ec62c04e340ee44df445482ad3efb4ec7be8b2132dd0e9dde68f4906f117795f0b87e8558ce8a3c66d74ba71354f41c6001d21cdde31d442a6ee5e954c3ef7377f69c160807ee02215acccf2939ff08b8c363df77bc4daf055e65e708ba584def45ceaae817d095c980b945b535bb505a18c954c918c24d87f746432294d0ad0065a14ea95e78890e861aa8ac1d64839f63a317ae9f4ba6e072cc83414f98575c27756111474d48d24567e033446d7384d9fbf73bd0d6bc4335917d29cc7b2eb3120c9db88860363b4becbe666db17dd37742f0ff3e3ce5ba2e375c3d6b1524373a7aec83ecd223b76c21fd2799c086922882322afa6378af83b98eea21a6fe57811853bfa0feb35a7de203b232288195c10ff9443ec810fd40c5d1347a71ebc37702833d5217ae69bfc73bb2f91c214162acac88ab3fb7a75afb86421073f83b60756ef8661e0dcffd5051166bc2102e358ef60fea3845b392644e90390c40c2462507d59fd3e6d8d32b5324b49fe901977cacd03c352d9f7e586d5ce8a79025caf58da6a47d55a8e431c81ce5da2a72c7bb15dd216afb73b336f3afec3629ac8a89d69e1adf761466de3ffc3214f879bd566dc1d258b12847794e3e4c0df8d1b8fa1fc0c093a2f8e3add9e39dd0ccd95cfe0325e80165d6ab2a3033908140a8c215ff3b59f3bd30263b9c220787c238a751c3c422dbd036d885c838e87c0606a7a6", 0x1000}, {&(0x7f00000068c0)="1632bf22851785b9264d5112b1a2c64379b4a44e6c0d6d09321e3f79bd282a012239ffc4cfa946907d5cc679da3716258acee3407c5fba6007aac99e29e10443ac236c7d62acb75537fb57f226c3f3096f9c93682622051e22d1d65b397136fd2e178a0814128d8b87d3ff4e6857e5e43db24fcc649a659c4990a1801dd47a5a789b05eb256cc251050892f7e6d271c3e8a7c38ece858c0c5952210edec41dcc238b563f83602caef4efec0f6a0193ebc9e5d4794ee7f9547f043e48673f8491672231e18d2f83f99c67109a0cc438830e1b9a3f26d06db34bd1327aaaa7619d71", 0xe1}, {&(0x7f00000069c0)="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", 0x1000}, {&(0x7f00000079c0)="2c9e5eb7a159ccdf767d9c5a359fc1dc4cd126464cf83efefb0bb251a2953668294e07c6da497f3cab6399562eaaccd8dc40aceface7a9ecf038866a1566ec41b09037fbddf18ca7ae75b2f1475e2f1775a3ab3bac7a9b", 0x57}, {&(0x7f0000007a40)="edd0d138ff6b18cff7519206bd65bd2294af9f6f10d83a6bca922f2e89a9f116b77b2428e6a68cc8eb9f", 0x2a}, {&(0x7f0000007a80)="d9396b88661b8cb78fa7b58a27ed48c3c959089a5e5efa54b70ac32232ef1da022a3700876947399baea6de6b7837bd2f115188e82760ecd33bffb0f98d19c", 0x3f}, {&(0x7f0000007ac0)="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", 0x1000}], 0xa, &(0x7f0000008b80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x406}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fff}}], 0x48}}, {{0x0, 0x0, &(0x7f0000008d00)=[{&(0x7f0000008c00)="627fc8263a3b58d4c49535a30b11e8f97e75be5ebbecb94bf9b1e92886002ec82c03c2a22505cd879aed76e07f6b22fba1366e88bd07f771a073f0c339983b9f2eab81270b0c3b452b3aff5ff3032d974e90593ebb77977261ae21c9a30042db8d73de95990b1849eeec3e82feb213a834b68725ef48bc68003bd6f8c74ab2c5d4d3114e02fcd48a41b38dd7d352c0d44eb4340435af7c29161f59a9ffe2816176a4b0d8cfe22ee1471955d8f83fce768d494331b7b5a4e59e78555738328462e847c3852f023da8008705a7da19d0580e48f14eae2500d7c29b578866b7ced52c9fa5928b33e44eaa81c3bfba7c92605c06eeba2c70", 0xf6}], 0x1, &(0x7f0000008f00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x1e}, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast, @dev={0xac, 0x14, 0x14, 0x14}}}}, @ip_retopts={{0x30, 0x0, 0x7, {[@ra={0x94, 0x6}, @timestamp={0x44, 0x10, 0x8, 0x0, 0x2, [{[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x9a}, {[], 0x7}]}, @ra={0x94, 0x6, 0x5e}, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast1, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7814}}], 0x128}}, {{&(0x7f0000009040)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000009100)=[{&(0x7f0000009080)="7d2025a942a91d8f637d7e2f7ae4b120090e8d4ecc700817184085fc3fd97739a72d9a6c668c8b817ed9c6dc11bd8fa5329b7ab26b9b67b2441bf0ad28231b37b20d543384b7957a12f215b7d8b42a7409eb82386f0cedb47fb1a890ccd3b03a11e860104e4b915043fe30a3", 0x6c}], 0x1, &(0x7f00000091c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x28, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x3d5a3f10, [@rand_addr=0x400000000000]}, @timestamp={0x44, 0x10, 0x6, 0x3, 0x8, [{[@broadcast], 0x5e85}, {[], 0x5}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @rand_addr=0x7, @rand_addr=0x3}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8f54}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x36b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0xcc53}}], 0x108}}, {{0x0, 0x0, &(0x7f0000009480)=[{&(0x7f0000009300)="38ecee29d6780129b7431499ea9e941047a2c965dfd64506ed5b5484c60e12e7c5a8cfa30bb235b69fd3fadd710ec925c43753cadd15580e8edb730d326e4dfa3d5fdd4152277b1015f33e215bb2990c149a4a34a592955e01f3fe6694556e885dafd449897f5efa096bdf19ef8afb8dc6441f38e29aef545203b377bae8e716f625ab209c0d7995ac86c702488995f46c336a742cd447c222b254f3ea17f73a693bac43a8e3063642427fdae3d2fbf1fb1a4f7e59ce478dc05e480c20358fe6396442a6e00ddeae086fe9741d9bd5df08bb730808f8f60107412b174ca184011dd8b4ef5a4b66e5ab386cdd66d050727a295f398290", 0xf6}, {&(0x7f0000009400)="625136a9460084265c7f40f9928f878e722047e17e22ce294162eacc28bd421d8558de6ac577c0b5348b402b6c3ff365f7110b25375a542245a05093ad0d4f0124ee51a73d4ae7fe331f8af7573d529d4fc281a3294747e5399e07b223a103ae176a7b074a3099d5379f9405cde956a76d711e8c", 0x74}], 0x2, &(0x7f0000009540)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x485f46f5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @empty, @dev={0xac, 0x14, 0x14, 0x17}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0x50}}, {{&(0x7f00000095c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000009980)=[{&(0x7f0000009600)="65dafd6ade5a6562471e9caecfe44e9e585fbbbb60b64c6b5c1b4208dfaf9a0126e99b1a3efa6f306c3083da778aa741d6846bb64f09e0b16eba7fa292ae121baf26891d2315dd988dc24c0631ce203aefa2d37cf311cf33764998b353687e47c01d147e39b48e99919860859dbc4e9c70c767e0705eee10b75b04afd96d33d064e538603ffe", 0x86}, {&(0x7f00000096c0)="ec8978725a4f3de4f4bc4ac7c9cf4e5bb41e8716c8e99373babcf22753a17a49e5f94a406fdda6f0d0518d56374cefba731f8033d463757fb44d5846c2b055199c5b773c9e9c7e6b4bd3d7b2fcf2372d9e255cc076901f04fc6f9916a706e7fc70631ba3e9a93b7617ee68a43e99dc4e5f208bd47fb8f6ac628a342963721415160808cba6531d18fa38fe5ddcc0f9b7b5a6f95ea32dd71eb759c42640d03bf558a9", 0xa2}, {&(0x7f0000009780)="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", 0xff}, {&(0x7f0000009880)="9018fa06ee9c2e77794bc340e7ab60a65c76df0979c7d2835167c8e8f2a3a791bd6d863e68f57988242e340a0a4d838919ed60c80635d950e64b32cb9a907d6928d8b139cc0bde48ce477b1a4369a40ec1b122eacf4db32ddf52fbf62491213ab21406c5792f0b41c62a2fcdbb7c67256252780a557f03a31ba62d20747161394c5cc7cd7952661d7fb6607a012fbdc289383348e5e3121be221cf07ddf55c209e9f61c83eed863689728c1bb7f5662315d79d3769ea564307a308ce6bfc05c3bca8f406029e1163cc8d0e09108bf43ade890474c55f7f42941e9298d02c696571e341bfc305567ab02416dadb29e8062067a6abfb", 0xf5}], 0x4, &(0x7f00000099c0)=[@ip_retopts={{0x30, 0x0, 0x7, {[@noop, @rr={0x7, 0x13, 0x20, [@rand_addr=0x8000, @multicast1, @local, @remote]}, @rr={0x7, 0xb, 0x6, [@broadcast, @empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x60}}], 0xa, 0x80) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000010000107000000000000000003000000a52525bf039c87a1ca000100003a66e53c151d1448d2fdd9a72eaf8c3ce17590ad0f2a0de3daccf81384c97dd9d80f666fffca9f5bfe4b1616fa3ad49d6ec85152a1dd19b9853b32288110c53952dbf7e8431e2087e8ca7ae7cb8a5b054dd51587332f500aff8d65a9278c28f5fb9041aa57aad769cefd74f7c3744623e2a40fca7aadfeeeb3e87e94981ea2da8675550f0026e4c1ac6dc2b6f7e50a300e79790e6ccf25aef2"], 0x14}}, 0x0) r10 = perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x97d9f196de230c8b, 0x0, 0x0, 0x0, 0x4a}}], 0x4000000000001a0, 0x2, 0x0) r11 = fcntl$getown(r10, 0x9) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x0, r11}) [ 342.627547] print_req_error: I/O error, dev loop2, sector 128 15:17:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:47 executing program 4 (fault-call:7 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 342.675362] print_req_error: I/O error, dev loop1, sector 128 15:17:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x80, 0x30}, &(0x7f00000003c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0x9, 0x7, 0x7646, 0x3, 0x100}, &(0x7f0000000440)=0x14) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r1, 0x0, 0xb, &(0x7f0000000200)='/dev/loop#\x00'}, 0x30) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x80000) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x401, 0xff, 0xfffffffffffff1a7, 0x7, 0x0, 0x3, 0x0, 0x7, 0x200, 0x100000001, 0x51775063, 0x6, 0x4, 0x7, 0x9, 0x80000000, 0x8, 0xbc76, 0x7b1, 0x9, 0x79, 0x1, 0x20, 0x2, 0x7, 0x6, 0x8, 0x7fff, 0x10000, 0x3, 0x5, 0x0, 0x3, 0x26fe, 0x9f, 0xc400, 0x0, 0xf04f, 0x4, @perf_config_ext={0x4, 0xfffffffffffffffc}, 0xc1, 0x800, 0xa5cc, 0x6, 0x46, 0x2, 0x9}, r4, 0xb, r3, 0xa) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r3) fanotify_mark(r1, 0x10, 0x40000000, r3, &(0x7f00000001c0)='./file0\x00') r5 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r5, r5, 0x0, 0x200000d) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000340)={0x10000000, 0x1, 0x1}) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20800, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 342.900304] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:17:48 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x4c282, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7, 0x20000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000003c0)={0x5, 0x1, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl(r2, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = dup(r2) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) sendto(r3, &(0x7f0000000240)="5a417957b292209917d1bd3b857ae6d55bf4d4db974f74f148c180bd7c3bad1cb9745618506b7c5a1757c8d970a147a80fc87035156d9441ed30f5393c6e329c9b33bc03047cbb05e4e47d967aeeb0560b8321b4cb2baf91c4574864bcf075c735bea5507e5689414eb7677d02373df99c81bb865af6a7a49178027af23a57fe94deb9cdc719195f07153e8d23043ad09c72a21cff44892a5d8aed0409521aad97684f81baa14eef787ae988b53e7b64eff3e15c0c785d", 0xb7, 0x40, &(0x7f0000000180)=@caif=@dbg={0x25, 0x0, 0x2}, 0x80) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000140)={0xfffffff, 0x98d, 0x0, [], &(0x7f00000000c0)={0xa20929, 0x8, [], @string=&(0x7f0000000080)=0x20}}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) connect$pptp(r3, &(0x7f0000000380)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) 15:17:48 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x0, &(0x7f00000000c0)=0xfffffffffffffff7, 0x1000003) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:48 executing program 5: get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0xd72, &(0x7f0000ffa000/0x3000)=nil, 0x4) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x6, 0x800) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x20303a86a03d1e05, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0)=""/62, 0x3e, 0x2000, &(0x7f0000000140)={0xa, 0x4e23, 0xa3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffffffffffe}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, 0x0, 0x279, 0x80, 0x28, "37ac3b9fbebe8d14c77d88514e2f8a5c37c7b34da420fbc0901f447b9c1be948b66308cf74803868"}, 0x34) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000002c0)=0xc) r3 = getpgrp(r2) tkill(r3, 0x6) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x110000890e, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000280)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 343.434665] FAULT_INJECTION: forcing a failure. [ 343.434665] name failslab, interval 1, probability 0, space 0, times 0 [ 343.484375] CPU: 0 PID: 18486 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 343.491528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.500891] Call Trace: [ 343.503492] dump_stack+0x138/0x197 [ 343.507120] should_fail.cold+0x10f/0x159 [ 343.511368] should_failslab+0xdb/0x130 [ 343.515360] __kmalloc+0x2f0/0x7a0 [ 343.519083] ? __sb_end_write+0xc1/0x100 [ 343.523148] ? strnlen_user+0x12f/0x1a0 [ 343.527248] ? SyS_memfd_create+0xba/0x3a0 [ 343.531480] SyS_memfd_create+0xba/0x3a0 [ 343.535544] ? shmem_fcntl+0x130/0x130 [ 343.539436] ? do_syscall_64+0x53/0x640 [ 343.543416] ? shmem_fcntl+0x130/0x130 [ 343.547316] do_syscall_64+0x1e8/0x640 [ 343.551211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.556066] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.561257] RIP: 0033:0x459879 [ 343.564446] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 343.572168] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 343.579443] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 343.586729] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 343.594084] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa8c32506d4 [ 343.601370] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0xaaaaaaaaaaaacf7, &(0x7f0000000380), 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x400, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x7, &(0x7f00000002c0)=0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000300)={0x3ff, 0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000340)={r2, 0xffffffff}) lsetxattr$security_ima(&(0x7f0000000040)='\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "36531ba17f6e4699b47f4a1dd026e7d2"}, 0x11, 0x1) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="2040817564fb0120e88dcdcf94e75333c30a81df3f7f62ffea6c5c1114093fa408dd75ef89e64ffbaaf7a0b3230805adda9619c1f3449c2d813315fac65e901c147a21e401f76a7e8ab8021ee1b4b62e418016bc4a", 0x55) 15:17:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) finit_module(r0, &(0x7f0000000140)=',-+\x00', 0x0) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+'}, 0x28, 0x3) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0xca8, 0x5, &(0x7f0000000540)=[{&(0x7f0000000240)="537c03ba65138be427bfa664473aacb22ffbb600928589dce59e78492f373a721b2bc016da5dec6125b1e49ea09429f94e95410492ebe820601e066d48e9d0fdb987e6e16a8e19e5a92bb6ee19386e4c339c88721c122fc0ab68400f059333", 0x5f, 0x10001}, {&(0x7f00000002c0)="005b2ed8c440c1d2f5b98beb685a4ab8949c4b22c854b3fe8a14daea4d099ebe324e7052ca2f1721e9af86bbeba50a5984312f22c40bf4dbab43ca057f3bf86bdff51da2fda2f6bbe5ebb6b06eeca5c77a", 0x51, 0x200}, {&(0x7f0000000340)="ead7cabf2e8e22457264f4c16cc057f976c92ab7fdfac675bf0e5ef1115a19c86653717042cbc52b22e8305afd9e9be903c7ab0a1095b10e5f14d2c53bb94eb1cbca66ad760f212130941de642f1d8da6af0619d51e90feb6b31de31d6579eaf561fa7a41a53d8e53daf4d5829965538d1c0f0", 0x73, 0x65154c5a}, {&(0x7f00000003c0)="4944b0e019eb50949d07c61589858406fc079de95837738ef21c11970717d4b399801e1156ff03a87e4dbac7eeb617a15caf9be630b250f9e0d0f1b9665351d96d4f3094be0e2d4a04904b2076e8d95b684b4622d2df9b56249533dcd99df457efc6c5b1b06d75b9059a177d3b2105", 0x6f, 0x3}, {&(0x7f0000000440)="b047c3fbbda4eea1598ca925ca40d73d80feabc6252719755bf2db07c274d5428f57c5cf811223b24f8187d481c717594159328d280db37fecd2eb390ce2ef8c5a8b812833f15cb092651bec34d85eefdaaeadd44017780e467011eac61edf56256ade634e64fc6d1d64006e46232bcf0730d90d0effd982bc0a17bdfedf748e824773be5a96d1ae6587096916cb9adf8c827f4ba4f8bbae846a46f0448fb22c79a030b4856ac49ae5d783ffc102fce41b9a4d988058d1b4ca03af5081b196e0dbe846f797e9fe282933cd1cc675441d1375aac56f914e8f4ca06faf53c27fa72e8e", 0xe2, 0x5}], 0x10000, 0x0) 15:17:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000340)=""/150) bind$bt_sco(r1, &(0x7f0000000300)={0x1f, {0x5, 0x2, 0xffffffffffffff81, 0x7fff, 0x800, 0x2}}, 0x8) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x3, 0x7, 0x4, 0x2, {0x0, 0x7530}, {0x5, 0x2, 0x10000, 0x48, 0x9, 0x4, "f051c195"}, 0x1, 0x4, @userptr=0xb09, 0x4}) ioctl(0xffffffffffffffff, 0x780, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x8000) pwritev(r3, &(0x7f0000000680)=[{&(0x7f0000000080)='\a', 0x1}], 0x1, 0x1081804) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000280)=[0xd500000000000000, 0x4]) sendfile(r3, r3, 0x0, 0x200000d) r4 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000240)={0x1, r4}) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:48 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:48 executing program 4: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000200)={{0x10001, 0x9, 0x8, 0x5}, 'syz0\x00', 0x11}) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000280)={0x4, 0x2}) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = semget$private(0x0, 0x0, 0x8) semop(r2, &(0x7f0000000000)=[{0x7, 0xe2, 0x800}, {0x0, 0xc80f}, {0x3, 0x100, 0x1800}, {0x3, 0x7, 0x894363cd87e946f}, {0x1, 0x3, 0x1800}, {0x2, 0x2, 0x5a3394964edb62f4}, {0x4, 0x8001, 0x1000}, {0x4, 0x1, 0x800}, {0x1, 0x9, 0x1800}, {0x622a0f1f07c079e1, 0x5, 0x1000}], 0xa) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000080)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 343.802098] FAULT_INJECTION: forcing a failure. [ 343.802098] name failslab, interval 1, probability 0, space 0, times 0 [ 343.859649] CPU: 0 PID: 18506 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 343.866808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.876168] Call Trace: [ 343.878771] dump_stack+0x138/0x197 [ 343.882422] should_fail.cold+0x10f/0x159 [ 343.886590] should_failslab+0xdb/0x130 [ 343.890580] kmem_cache_alloc+0x2d7/0x780 [ 343.894739] ? __alloc_fd+0x1d4/0x4a0 [ 343.898556] __d_alloc+0x2d/0x9f0 [ 343.902645] ? lock_downgrade+0x6e0/0x6e0 [ 343.906902] d_alloc_pseudo+0x1e/0x30 [ 343.910802] __shmem_file_setup.part.0+0xd8/0x400 [ 343.915657] ? __alloc_fd+0x1d4/0x4a0 [ 343.919470] ? shmem_fill_super+0x8c0/0x8c0 [ 343.923812] SyS_memfd_create+0x1f9/0x3a0 [ 343.927970] ? shmem_fcntl+0x130/0x130 [ 343.931865] ? do_syscall_64+0x53/0x640 [ 343.935932] ? shmem_fcntl+0x130/0x130 [ 343.939835] do_syscall_64+0x1e8/0x640 [ 343.943719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.943735] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.943743] RIP: 0033:0x459879 15:17:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:49 executing program 4: prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) accept4$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x57935a55e5ceab8b) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:49 executing program 3 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 343.943748] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 343.943759] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 343.943765] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 343.943771] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 343.943777] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa8c32506d4 [ 343.943785] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 344.034817] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=49000000) [ 344.050590] loop_set_status: loop0 () has still dirty pages (nrpages=321) 15:17:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf07081da844d1547ea28f47738e2c3e02d212245a91d106f741ebbded7c37fc834b0a3f1d381e5af744f453410329b22f6159ad4e8ed7ccd74e606b6f10f7d7300c2a635214b413ad438300e8f6d6d22b2c68a61b0ed18a75a9815b63f50d19ca3c503b7544e75ca3c22a66497e4fcc190de0ee548b050c74225692d755d763700"/150) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 344.102819] FAULT_INJECTION: forcing a failure. [ 344.102819] name failslab, interval 1, probability 0, space 0, times 0 [ 344.178548] CPU: 0 PID: 18536 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 344.185711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.185717] Call Trace: [ 344.185738] dump_stack+0x138/0x197 [ 344.185755] should_fail.cold+0x10f/0x159 [ 344.185770] should_failslab+0xdb/0x130 [ 344.185784] kmem_cache_alloc+0x2d7/0x780 [ 344.185796] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 344.185809] ? rcu_read_lock_sched_held+0x110/0x130 [ 344.185821] ? shmem_destroy_callback+0xa0/0xa0 [ 344.185831] shmem_alloc_inode+0x1c/0x50 [ 344.185840] alloc_inode+0x64/0x180 [ 344.185849] new_inode_pseudo+0x19/0xf0 [ 344.185858] new_inode+0x1f/0x40 [ 344.185868] shmem_get_inode+0x75/0x750 [ 344.247903] __shmem_file_setup.part.0+0x111/0x400 [ 344.252822] ? __alloc_fd+0x1d4/0x4a0 [ 344.256606] ? shmem_fill_super+0x8c0/0x8c0 [ 344.260921] SyS_memfd_create+0x1f9/0x3a0 [ 344.265048] ? shmem_fcntl+0x130/0x130 [ 344.268925] ? do_syscall_64+0x53/0x640 [ 344.272883] ? shmem_fcntl+0x130/0x130 [ 344.276751] do_syscall_64+0x1e8/0x640 [ 344.280619] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.285448] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.290703] RIP: 0033:0x459879 [ 344.293875] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 344.301571] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 344.308824] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 344.316078] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 344.323677] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa8c32506d4 [ 344.331104] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r0, 0x3, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x6) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x2, {{0x40, 0x3, 0x5}, 0xfff}}, 0x18) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x2000009) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8080, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000140)={0x9, 0x3, 0x3, {0x0, 0x1c9c380}, 0x100, 0x1cc2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:49 executing program 3 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:49 executing program 2: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101480, 0x50) clock_gettime(0x4, &(0x7f0000000480)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000001c0)={0x4, 0xb, 0x0, 0x8, {r2, r3/1000+30000}, {0x7, 0x0, 0x101, 0x3, 0x0, 0x0, "95ef68d7"}, 0x100000000, 0x0, @userptr=0x80000001, 0x4}) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r4 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000003c0)=0x9, 0x4) sendfile(r4, r4, 0x0, 0x200000d) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) ptrace$getregset(0x4204, r5, 0x6, &(0x7f0000000380)={&(0x7f00000002c0)=""/133, 0x85}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000080)) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 344.761022] FAULT_INJECTION: forcing a failure. [ 344.761022] name failslab, interval 1, probability 0, space 0, times 0 [ 344.772546] CPU: 0 PID: 18579 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 344.779642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.789096] Call Trace: [ 344.791684] dump_stack+0x138/0x197 [ 344.791704] should_fail.cold+0x10f/0x159 [ 344.791719] should_failslab+0xdb/0x130 [ 344.791730] kmem_cache_alloc+0x2d7/0x780 [ 344.791741] ? shmem_alloc_inode+0x1c/0x50 [ 344.811829] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 344.817287] selinux_inode_alloc_security+0xb6/0x2a0 [ 344.822389] security_inode_alloc+0x94/0xd0 [ 344.826781] inode_init_always+0x552/0xaf0 [ 344.831115] alloc_inode+0x81/0x180 [ 344.834734] new_inode_pseudo+0x19/0xf0 [ 344.838689] new_inode+0x1f/0x40 [ 344.842048] shmem_get_inode+0x75/0x750 [ 344.846026] __shmem_file_setup.part.0+0x111/0x400 [ 344.850947] ? __alloc_fd+0x1d4/0x4a0 [ 344.854826] ? shmem_fill_super+0x8c0/0x8c0 [ 344.859141] SyS_memfd_create+0x1f9/0x3a0 [ 344.863279] ? shmem_fcntl+0x130/0x130 [ 344.867152] ? do_syscall_64+0x53/0x640 [ 344.871122] ? shmem_fcntl+0x130/0x130 [ 344.875007] do_syscall_64+0x1e8/0x640 [ 344.878883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.883726] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.888904] RIP: 0033:0x459879 [ 344.892226] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 344.899939] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 15:17:50 executing program 3 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 344.907234] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 344.914608] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 344.921876] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa8c32506d4 [ 344.929156] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x83de0a9b81f5d1bb, 0x5, {0x7, 0x1f, 0x7, 0xb7580040bd418d7d, 0x7, 0x6, 0x200, 0x8}}, 0x50) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r3 = semget$private(0x0, 0x2496ca79e2c81618, 0x10) semctl$SEM_INFO(r3, 0x1, 0x13, &(0x7f00000001c0)=""/88) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setflags(r0, 0x2, 0x0) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 345.078131] FAULT_INJECTION: forcing a failure. [ 345.078131] name failslab, interval 1, probability 0, space 0, times 0 15:17:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000100)="7ced8a6a18e303fa3b3a8d7730bc22c61a2bc1994b8d0b5129ba65758159479a8c98f679f325b06a9f92c9c031f67da1b10b9e01697fbc34e794671c7fe7fc0166adc94b7a32a2e7caa1e5e94c87664c53f23064b6a00f87dffdeba2fc8da66b3024fe4ef5e84c3f651afb4022973706a73a0b3d4b1d311376d9d4a55008249cb72bb507dbe46f5216e906135cc27d481b4b1557d7eb902d94ba42904207c6d9d90a708997e1a374cbbca9145f77628b2d", 0xb1}, {&(0x7f0000000380)="dabcbc21bfc5545f1d9957139d0a5b28d8b36391c02a515508f780e691a561a9253487cb3eb91957487c6b8d7a139d9f97ad5431ac5c97c7d053e3050fb1009eb6256ec348a581571bd08c213c7495e10680ea264c76a91b72919d0a71f0399bc80abb63c2d70b6461b52236a047309d86671ee13eb5e941ce9c26dd8af46f19534bbdcbd299c99a9d98178441", 0x8d}, {&(0x7f00000001c0)="fe8b4165db5115a303dad1e6c097b2e8a381d652ae2bfd6426c6a6d61498e79d92c75660d25962c7885012d3801e2b330b69d6788c3b12", 0x37}, {&(0x7f0000000440)="589f43fe2400445603ce42c69368f62cbee48dde4528e729246047c533c060346e24218fdf3e5c2c653e8ad5c5a0f7c73053466c5e24674c4dc897d48d9b2550569a931e441e2460755b4ce577a104383adc01c8913430c7cacb533a865f0745bc1f647a4be60210e23bd7c9d5b8315d9f6d92da44a4eb1eeff0f528b179327023aab11e3bad3789657b20777490b8b8f726f77397b62020fa47bf8a5baa569976b9b0b2de5baccbcc33e23b70fb27b21f8f46c0bf10afd04c532cb03f70b00fe067a20175d206b90681aebc162f15a7536a0b0be457a618c2a4426b2c8d85", 0xdf}, {&(0x7f0000000540)="d34b02cbcba77c128d3ba32d21498dc101d632322b9e197f1a37cee320d0ea9f6b76971e58bcd3760b55fb4307308109aae2008d80018bea63a9e2124ff32e25925629bf5a8911ef022caf8048c7", 0x4e}, {&(0x7f0000000200)="51f396de6bb3443c7678c22d9e32607845bb530cb38bb3", 0x9}], 0x6, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000280)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) r2 = getpgid(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f0000000000)) [ 345.130256] CPU: 0 PID: 18603 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 345.137402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.137408] Call Trace: [ 345.137427] dump_stack+0x138/0x197 [ 345.137447] should_fail.cold+0x10f/0x159 [ 345.137466] should_failslab+0xdb/0x130 [ 345.161146] kmem_cache_alloc+0x2d7/0x780 [ 345.161163] ? lock_downgrade+0x6e0/0x6e0 [ 345.161177] get_empty_filp+0x8c/0x3f0 [ 345.161186] alloc_file+0x23/0x440 15:17:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:50 executing program 3 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 345.161198] __shmem_file_setup.part.0+0x1b1/0x400 [ 345.161209] ? __alloc_fd+0x1d4/0x4a0 [ 345.181996] ? shmem_fill_super+0x8c0/0x8c0 [ 345.182016] SyS_memfd_create+0x1f9/0x3a0 [ 345.182026] ? shmem_fcntl+0x130/0x130 [ 345.182041] ? do_syscall_64+0x53/0x640 [ 345.190141] ? shmem_fcntl+0x130/0x130 [ 345.190155] do_syscall_64+0x1e8/0x640 [ 345.190164] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.190181] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.190188] RIP: 0033:0x459879 [ 345.190193] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 345.190203] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 345.190208] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 345.190213] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 345.190218] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa8c32506d4 [ 345.190223] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 345.218568] loop_set_status: loop0 () has still dirty pages (nrpages=14) [ 345.331684] FAULT_INJECTION: forcing a failure. [ 345.331684] name failslab, interval 1, probability 0, space 0, times 0 [ 345.368313] CPU: 0 PID: 18629 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 345.375493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.375499] Call Trace: [ 345.375517] dump_stack+0x138/0x197 [ 345.375536] should_fail.cold+0x10f/0x159 [ 345.387464] should_failslab+0xdb/0x130 [ 345.395211] kmem_cache_alloc+0x2d7/0x780 [ 345.395222] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 345.395236] ? check_preemption_disabled+0x3c/0x250 [ 345.408766] selinux_file_alloc_security+0xb4/0x190 [ 345.408777] security_file_alloc+0x6d/0xa0 [ 345.408790] get_empty_filp+0x162/0x3f0 [ 345.426990] alloc_file+0x23/0x440 [ 345.430539] __shmem_file_setup.part.0+0x1b1/0x400 [ 345.435473] ? __alloc_fd+0x1d4/0x4a0 [ 345.439314] ? shmem_fill_super+0x8c0/0x8c0 [ 345.443652] SyS_memfd_create+0x1f9/0x3a0 [ 345.447805] ? shmem_fcntl+0x130/0x130 [ 345.451702] ? do_syscall_64+0x53/0x640 [ 345.455684] ? shmem_fcntl+0x130/0x130 [ 345.459703] do_syscall_64+0x1e8/0x640 [ 345.463594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.468459] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.473654] RIP: 0033:0x459879 [ 345.476844] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 345.484559] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 345.491840] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 345.499128] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 345.506426] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa8c32506d4 [ 345.513702] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fremovexattr(r0, &(0x7f0000000280)=@known='trusted.overlay.metacopy\x00') r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000340)={0x0, 0x0, 0x3}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x3, 0x2000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000003c0)={r2, 0x80000, r3}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x40) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='coredump_filter\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f0000000240)={0x0, @aes128, 0x0, "53395b4f9621a73c"}) bind$pptp(r4, &(0x7f0000000140)={0x18, 0x2, {0x0, @local}}, 0x1e) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0xa}, @loopback, @dev={0xac, 0x14, 0x14, 0x10}}, 0xc) write$selinux_attr(r4, &(0x7f0000000180)='system_u:object_r:watchdog_device_t:s0\x00', 0x27) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r4, 0xc0305602, &(0x7f00000002c0)={0x0, 0xdc, 0x201b, 0xe79912d1f12bfdc9}) 15:17:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:50 executing program 3 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000000c0)=0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:51 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x20000, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000b40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000d00)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast1, 0x4e22, 0x5a6, 0x4e23, 0x2e, 0xa, 0x20, 0x80, 0x1d, r1, r2}, {0x200, 0x9, 0x1, 0x1, 0x4bd5, 0x8, 0x100, 0xd48b}, {0x7, 0x7d68e38b, 0xec6, 0x96d8}, 0x101, 0x6e6bba, 0x0, 0x1, 0x3, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x22}, 0x4d3, 0x32}, 0x2, @in6=@local, 0x3504, 0x1, 0x1, 0x74, 0x7, 0xb64, 0x3fe}}, 0xe8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r4 = getuid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x2f3, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000280)="bbad9f3d11f195fb501f03ab166af3ab254074d691290fcc9431529b6f6a84b2ba7211df63a2d77f075f115c048f33960aecfb92b978923f99a3e35f57be0302f9b0c3770fc39314f018a3a02bf8757d4e262f143100a1c98fdfa0ecebd8913f0f1aec869e1e2214fe3f0ce6cbd5860a3ee999a004e3447f2e093273b99a4a7f583403789d8047ad7494db90eb6a1688a50fd5", 0x93, 0xc88}, {&(0x7f0000000340)="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", 0xfe, 0x6d8}, {&(0x7f00000001c0)="403089c0ce", 0x5, 0x2}, {&(0x7f0000000440)="d26806d2f07970ac39bf100974bc4369fbbe2cb31fd4b09f6c8c311a2477b4e7bd6c835ed1fce0dd2917c2d1839059386dea39abf81194a77cfc8721a17129886194dada75238e9fb8f90c3941a72d028e566863759852c0015ae1979a037c0d3ec47de7f01151c4c2a029337fb3863abea5ea6cc0b746042fcaf35c26ebca84199580bf049f56f3852d2fa16b5215045f42db936b3636615d55cecaf153e964872ed874bc4d9077d5", 0xa9}, {&(0x7f0000000500)="975e732e3f7b385dcab969bbcb608331139c2ceadbb68cf9139fe6c192be8e4c1079da38b4b79c3bd60d21f7c52caca5e80c120d59f69c76a94e1f02268ce04d6f808238bcc251c6f31635a70d22bfbd66775704a60ac06960bbb2465156ea8195590624f40577afb91f8ae5907ffa2c039bc30ff79f03bad1df46cc64a4d0e8ea350a03a57e7174b9ba022de70c36690d5d8415caadd476bd95faa0e308d86401", 0xa1, 0x1ff}], 0x2000, &(0x7f00000006c0)={[{@barrier='barrier'}, {@commit={'commit', 0x3d, 0x8000}}, {@datasum='datasum'}, {@commit={'commit', 0x3d, 0x80}}, {@inode_cache='inode_cache'}, {@nobarrier='nobarrier'}], [{@fowner_gt={'fowner>', r4}}]}) r5 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r5, r5, 0x0, 0x200000d) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000640)={0x0, 0x0, 0x1, 0x5}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000740)={r6, 0xfffffffffffffff9}) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 345.936775] FAULT_INJECTION: forcing a failure. [ 345.936775] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.999765] CPU: 0 PID: 18653 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 346.007035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.016399] Call Trace: [ 346.019004] dump_stack+0x138/0x197 [ 346.022657] should_fail.cold+0x10f/0x159 [ 346.026818] ? __might_sleep+0x93/0xb0 [ 346.030818] __alloc_pages_nodemask+0x1d6/0x7a0 [ 346.035504] ? __alloc_pages_slowpath+0x2930/0x2930 [ 346.040532] ? lock_downgrade+0x6e0/0x6e0 [ 346.044681] alloc_pages_vma+0xc9/0x4c0 [ 346.048673] shmem_alloc_page+0xf6/0x1a0 [ 346.052758] ? shmem_swapin+0x1a0/0x1a0 [ 346.056724] ? cred_has_capability+0x142/0x290 [ 346.061298] ? check_preemption_disabled+0x3c/0x250 [ 346.066303] ? __this_cpu_preempt_check+0x1d/0x30 [ 346.071141] ? percpu_counter_add_batch+0x112/0x160 [ 346.076233] ? __vm_enough_memory+0x26a/0x490 [ 346.080718] shmem_alloc_and_acct_page+0x12a/0x680 [ 346.085725] shmem_getpage_gfp+0x3e7/0x25d0 [ 346.090046] ? shmem_add_to_page_cache+0x860/0x860 [ 346.094968] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 346.100152] shmem_write_begin+0xfd/0x1b0 [ 346.104545] ? trace_hardirqs_on_caller+0x400/0x590 [ 346.109647] generic_perform_write+0x1f8/0x480 [ 346.114219] ? page_endio+0x530/0x530 [ 346.118010] ? current_time+0xb0/0xb0 [ 346.121801] ? generic_file_write_iter+0x9a/0x660 [ 346.126655] __generic_file_write_iter+0x239/0x5b0 [ 346.131585] generic_file_write_iter+0x303/0x660 [ 346.136332] __vfs_write+0x4a7/0x6b0 [ 346.140033] ? selinux_file_open+0x420/0x420 [ 346.144692] ? kernel_read+0x120/0x120 [ 346.148576] ? check_preemption_disabled+0x3c/0x250 [ 346.153579] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 346.159039] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 346.163783] ? __sb_start_write+0x153/0x2f0 [ 346.168090] vfs_write+0x198/0x500 [ 346.171612] SyS_pwrite64+0x115/0x140 [ 346.175400] ? SyS_pread64+0x140/0x140 [ 346.179300] ? do_syscall_64+0x53/0x640 [ 346.183264] ? SyS_pread64+0x140/0x140 [ 346.187162] do_syscall_64+0x1e8/0x640 [ 346.191044] ? trace_hardirqs_off_thunk+0x1a/0x1c 15:17:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0x4, 0x9, 0x319d, 0xfffffffffffffff7, 0x4a64016c, 0x4, 0x11, 0x727ce7988ff3c204}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 346.195904] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.201075] RIP: 0033:0x4137c7 [ 346.204245] RSP: 002b:00007fa8c324fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 346.211975] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 346.219406] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000005 [ 346.226665] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 346.233919] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 346.241172] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:51 executing program 3 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 346.439937] FAULT_INJECTION: forcing a failure. [ 346.439937] name failslab, interval 1, probability 0, space 0, times 0 [ 346.451535] CPU: 0 PID: 18692 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 346.458625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.467994] Call Trace: [ 346.470575] dump_stack+0x138/0x197 [ 346.474199] should_fail.cold+0x10f/0x159 [ 346.478347] should_failslab+0xdb/0x130 [ 346.482337] kmem_cache_alloc+0x47/0x780 [ 346.486472] ? __alloc_pages_slowpath+0x2930/0x2930 [ 346.491578] ? lock_downgrade+0x6e0/0x6e0 [ 346.495929] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 346.501571] __radix_tree_create+0x337/0x4d0 [ 346.506067] __radix_tree_insert+0xab/0x570 [ 346.510395] ? __radix_tree_create+0x4d0/0x4d0 [ 346.515081] shmem_add_to_page_cache+0x5a4/0x860 [ 346.520125] ? shmem_writepage+0xbb0/0xbb0 [ 346.524354] ? __radix_tree_preload+0x1d2/0x260 [ 346.529044] shmem_getpage_gfp+0x1757/0x25d0 [ 346.533648] ? shmem_add_to_page_cache+0x860/0x860 [ 346.538575] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 346.543784] shmem_write_begin+0xfd/0x1b0 [ 346.547936] ? trace_hardirqs_on_caller+0x400/0x590 [ 346.552951] generic_perform_write+0x1f8/0x480 [ 346.557533] ? page_endio+0x530/0x530 [ 346.561331] ? current_time+0xb0/0xb0 [ 346.565129] ? generic_file_write_iter+0x9a/0x660 [ 346.569972] __generic_file_write_iter+0x239/0x5b0 [ 346.574892] generic_file_write_iter+0x303/0x660 [ 346.579742] __vfs_write+0x4a7/0x6b0 [ 346.583475] ? selinux_file_open+0x420/0x420 [ 346.588144] ? kernel_read+0x120/0x120 [ 346.592045] ? check_preemption_disabled+0x3c/0x250 [ 346.597248] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 346.602705] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 346.607458] ? __sb_start_write+0x153/0x2f0 [ 346.611796] vfs_write+0x198/0x500 [ 346.615330] SyS_pwrite64+0x115/0x140 [ 346.619135] ? SyS_pread64+0x140/0x140 [ 346.623023] ? do_syscall_64+0x53/0x640 [ 346.627193] ? SyS_pread64+0x140/0x140 [ 346.631075] do_syscall_64+0x1e8/0x640 [ 346.635216] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.640069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.645453] RIP: 0033:0x4137c7 [ 346.648629] RSP: 002b:00007fa8c324fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 346.656394] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 346.663665] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000005 [ 346.670923] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 346.678198] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 15:17:51 executing program 0: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 346.685550] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 346.701339] print_req_error: 1 callbacks suppressed [ 346.701344] print_req_error: I/O error, dev loop1, sector 128 15:17:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000080)={0x2, {0x735e, 0x1, 0x10000, 0x4}, {0x2, 0xab, 0x5, 0x8}, {0x400, 0x5d99}}) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:52 executing program 0: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={&(0x7f0000000140)=@rc={0x1f, {0x8000, 0x800, 0x0, 0x2, 0xebdf, 0x200}, 0x6}, 0x80, &(0x7f0000000600)=[{&(0x7f00000001c0)="aa8668397c90338016fe7cf9a7e958f3f7add9f196e47fd913600222633926d4142329d5b38cee79dbaa0296b0e8990943d3566f633e05307aba2494d7dacd7886ab987bd6c02c51d28c8534c87c5d46cf6ade9b560e40363fdefe7209db8de3fc70e2eb153be0118e97ccfa70fdaf1b", 0x70}, {&(0x7f0000000280)="d49eb7133ae09f6cba0ef9d29c1fa588b76430f77594412a1d998e0c22a5d31697ee21f751d788fe193ea3659bd4a3161afd9a7b5fe67d742378cee4703d412bbbe75d55fc969175f270a22481ade8b557f150c1c91538c1a040da38c944e195ff6b82e1b61502143407ed9e145c8ce394cf5426147899c99d8627b08dd0bdebc2743a12e5473be1e8d51db762da27776022604451964f79409a7d507072fb5fc498db4797d3e5e6fb61f992f67239466704f9aac52d8104404eb84ba31ec6cef6dd35f82fe5d6f5", 0xc8}, {&(0x7f0000000380)="24a2b8cb355d9e368989342d555e84e2e084f8d4f21eabb157b95912796d5fd568d4b7b4a33f056574ccc1a3ab3df8fbe7d8a7d174f41292c779c84051ec470f231c28af66db2a7c1f9fb1b6866548bb18f51aeeff82548da1bf2b61ce4094c9b2ac8b11c7b75d2ca3840d4bc26fcd8654310173143986e6171204a0888c0eb4a4537c2465f2dcfd290fcaa48aeba70affaed4450a659702dd377ee6d5acc1814ed7e500fdf52346eb5f0d6e552eb908a7", 0xb1}, {&(0x7f0000000440)="600519df731f9ee0772c6400812d354723e894d925093b53dc18d6ee960596ca7bf8f8c71db401d85db9e3b2a7ac04c2bab7a32ff6c14deea8e5af71575c53afe2574d1b0379cbeb506232c15fb30ae90ed2c909ab69e7018b61a56742e0a592563228dd017411f2b1d0de40528b0b610e6fafde316db7d60b2157b7c95f8190a63a24853e882dc3c60e771fd0", 0x8d}, {&(0x7f0000000500)="a62880000ca323cbd702d5e01967ef7f1eca1a2fad995ad54a5d3f16349fa0b26ad64281de744cb19697bdf21082166aac1ec59e63e2620cbdcc4b5b6951a1e35f2a7566f8a6a9d09bf889bdd0e67744f803a9f0370aae375e99e47aa61e545cfd6f958e787178a9046e3bcea4f3abfc97eb171a97c3e70c8893d11ea47b8cb3a85ea0953f599c1203f0fa4871be6e61020a46e9d6bc9bb1464dbafb6f43ee4b216d48ba9133ecc3789e941b7beb8d99c2263a85e60bc36222b0d34e85b4e83743b2ab742f7b129589d789e24e2f71f5ab", 0xd1}], 0x5, &(0x7f00000006c0)=[@txtime={{0x18, 0x1, 0x3d, 0x7ff}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xe1}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x78}, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dmidecode_exec_t:s0\x00', 0x26, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) 15:17:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x80004e22, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty={[0xf401000000000000]}}, 0x1c) 15:17:52 executing program 3 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:52 executing program 0: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 347.011468] FAULT_INJECTION: forcing a failure. [ 347.011468] name failslab, interval 1, probability 0, space 0, times 0 [ 347.070760] CPU: 1 PID: 18723 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 347.078201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.087591] Call Trace: [ 347.090200] dump_stack+0x138/0x197 [ 347.093849] should_fail.cold+0x10f/0x159 [ 347.098017] should_failslab+0xdb/0x130 [ 347.102009] kmem_cache_alloc+0x2d7/0x780 [ 347.106249] ? vfs_write+0x25f/0x500 [ 347.106266] getname_flags+0xcb/0x580 [ 347.106279] ? check_preemption_disabled+0x3c/0x250 15:17:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x70, r3, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa00000000000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4008800) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:52 executing program 5: [ 347.106289] getname+0x1a/0x20 [ 347.106298] do_sys_open+0x1e7/0x430 [ 347.118841] ? filp_open+0x70/0x70 [ 347.118851] ? fput+0xd4/0x150 [ 347.118862] ? SyS_pwrite64+0xca/0x140 [ 347.118876] SyS_open+0x2d/0x40 [ 347.118883] ? do_sys_open+0x430/0x430 [ 347.118894] do_syscall_64+0x1e8/0x640 [ 347.125809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.125828] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.125837] RIP: 0033:0x413761 [ 347.125842] RSP: 002b:00007fa8c324fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 15:17:52 executing program 5: 15:17:52 executing program 3 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 347.125857] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 347.132557] RDX: 00007fa8c324fb0a RSI: 0000000000000002 RDI: 00007fa8c324fb00 [ 347.132565] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 347.132570] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 347.132575] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 347.237690] FAULT_INJECTION: forcing a failure. [ 347.237690] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.249541] CPU: 1 PID: 18750 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 347.256651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.266017] Call Trace: [ 347.268622] dump_stack+0x138/0x197 [ 347.272388] should_fail.cold+0x10f/0x159 [ 347.276604] __alloc_pages_nodemask+0x1d6/0x7a0 [ 347.281429] ? fs_reclaim_acquire+0x20/0x20 [ 347.285748] ? __alloc_pages_slowpath+0x2930/0x2930 [ 347.290804] cache_grow_begin+0x80/0x400 [ 347.294921] kmem_cache_alloc+0x6a6/0x780 [ 347.299095] ? vfs_write+0x25f/0x500 [ 347.302811] getname_flags+0xcb/0x580 [ 347.306609] ? check_preemption_disabled+0x3c/0x250 [ 347.311626] getname+0x1a/0x20 [ 347.314821] do_sys_open+0x1e7/0x430 [ 347.318706] ? filp_open+0x70/0x70 [ 347.322232] ? fput+0xd4/0x150 [ 347.325417] ? SyS_pwrite64+0xca/0x140 [ 347.329469] SyS_open+0x2d/0x40 [ 347.332740] ? do_sys_open+0x430/0x430 [ 347.336657] do_syscall_64+0x1e8/0x640 [ 347.340543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.345387] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.350835] RIP: 0033:0x413761 [ 347.354017] RSP: 002b:00007fa8c324fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 347.361799] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 347.369064] RDX: 00007fa8c324fb0a RSI: 0000000000000002 RDI: 00007fa8c324fb00 [ 347.376327] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 15:17:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:52 executing program 5: 15:17:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 347.383588] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 347.390853] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:52 executing program 5: 15:17:52 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x9, 0x100) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r0, 0x0, 0x8) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:52 executing program 5: 15:17:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000080)) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getegid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:52 executing program 5: [ 347.590214] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:17:52 executing program 3 (fault-call:2 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 347.655154] print_req_error: I/O error, dev loop2, sector 128 [ 347.705182] FAULT_INJECTION: forcing a failure. [ 347.705182] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.717038] CPU: 0 PID: 18791 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 347.724256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.733710] Call Trace: [ 347.736320] dump_stack+0x138/0x197 [ 347.739997] should_fail.cold+0x10f/0x159 [ 347.744164] __alloc_pages_nodemask+0x1d6/0x7a0 [ 347.748941] ? fs_reclaim_acquire+0x20/0x20 [ 347.753655] ? __alloc_pages_slowpath+0x2930/0x2930 [ 347.758698] cache_grow_begin+0x80/0x400 [ 347.762780] kmem_cache_alloc+0x6a6/0x780 [ 347.766937] ? vfs_write+0x25f/0x500 [ 347.770673] getname_flags+0xcb/0x580 [ 347.774485] ? check_preemption_disabled+0x3c/0x250 [ 347.779795] getname+0x1a/0x20 [ 347.783104] do_sys_open+0x1e7/0x430 [ 347.786835] ? filp_open+0x70/0x70 [ 347.790388] ? fput+0xd4/0x150 [ 347.793588] ? SyS_pwrite64+0xca/0x140 [ 347.797489] SyS_open+0x2d/0x40 [ 347.800879] ? do_sys_open+0x430/0x430 [ 347.804959] do_syscall_64+0x1e8/0x640 [ 347.808948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.813815] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.819010] RIP: 0033:0x413761 [ 347.822201] RSP: 002b:00007fa8c324fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 347.830280] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 347.837830] RDX: 00007fa8c324fb0a RSI: 0000000000000002 RDI: 00007fa8c324fb00 [ 347.845116] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 15:17:52 executing program 5: 15:17:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000080)={0x2, 0x83, &(0x7f0000000280)="15ec40b1213070214416fef5dab4874122c9d740b8c3f3fb8481de724602eb7b1f46c5374716575a9437d52676cdd8d09c918d08e217f3057a7fcaf6d928648957059a0218cad47880120f92aba58e820280f4b907f20f92e775ae36844858dcf4cf37c2c298e84c1cc0d5972d2fe2c93f5872c9e0038dbefd92c42113ca78b3a83a52"}) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000001c0)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) [ 347.852395] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 347.860063] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:53 executing program 5: [ 348.006966] print_req_error: I/O error, dev loop2, sector 128 15:17:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 15:17:53 executing program 5: 15:17:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:53 executing program 3 (fault-call:2 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:53 executing program 5: [ 348.431247] FAULT_INJECTION: forcing a failure. [ 348.431247] name failslab, interval 1, probability 0, space 0, times 0 [ 348.455754] print_req_error: I/O error, dev loop0, sector 0 [ 348.464381] print_req_error: I/O error, dev loop0, sector 1024 [ 348.477842] CPU: 1 PID: 18830 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 348.485498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.485503] Call Trace: [ 348.485528] dump_stack+0x138/0x197 [ 348.485548] should_fail.cold+0x10f/0x159 [ 348.485563] should_failslab+0xdb/0x130 [ 348.510056] kmem_cache_alloc_trace+0x2e9/0x790 [ 348.514800] ? __lockdep_init_map+0x10c/0x570 [ 348.519314] ? loop_get_status64+0x120/0x120 [ 348.523736] __kthread_create_on_node+0xe3/0x3e0 [ 348.528677] ? kthread_park+0x140/0x140 [ 348.532881] ? __fget+0x210/0x370 [ 348.536704] ? loop_get_status64+0x120/0x120 [ 348.541116] kthread_create_on_node+0xa8/0xd0 [ 348.541133] ? __kthread_create_on_node+0x3e0/0x3e0 [ 348.541149] ? __lockdep_init_map+0x10c/0x570 [ 348.541168] lo_ioctl+0xcf7/0x1ce0 [ 348.541176] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 348.541190] ? loop_probe+0x160/0x160 [ 348.559172] blkdev_ioctl+0x96b/0x1860 [ 348.559184] ? blkpg_ioctl+0x980/0x980 [ 348.559201] ? __might_sleep+0x93/0xb0 [ 348.559210] ? __fget+0x210/0x370 [ 348.559225] block_ioctl+0xde/0x120 [ 348.580141] ? blkdev_fallocate+0x3b0/0x3b0 [ 348.591850] do_vfs_ioctl+0x7ae/0x1060 [ 348.595748] ? selinux_file_mprotect+0x5d0/0x5d0 [ 348.600795] ? lock_downgrade+0x6e0/0x6e0 [ 348.604964] ? ioctl_preallocate+0x1c0/0x1c0 [ 348.609740] ? __fget+0x237/0x370 [ 348.613206] ? security_file_ioctl+0x89/0xb0 [ 348.617833] SyS_ioctl+0x8f/0xc0 [ 348.621202] ? do_vfs_ioctl+0x1060/0x1060 [ 348.625383] do_syscall_64+0x1e8/0x640 15:17:53 executing program 5: 15:17:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 348.629328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.629344] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 348.640575] RIP: 0033:0x4596e7 [ 348.643772] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.651485] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 348.659578] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 348.666943] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 348.674511] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 15:17:53 executing program 5: [ 348.682206] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 348.693561] print_req_error: I/O error, dev loop0, sector 2048 15:17:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:53 executing program 5: 15:17:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x1c, r1, 0xc03, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x119}, 0x14}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0xcc400, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000480)={0x7, 0x6d, 0x1}, 0x7) ioctl(r2, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200442, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r5, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000004c0)={0x200, 0x1, 0x3, 0x80, 0x0}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r6, @in={{0x2, 0x4e21, @empty}}}, &(0x7f00000000c0)=0x24) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000240)={r7, 0x4, 0x3, [0x3, 0x6, 0xa309]}, 0xe) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)='\'', 0x12a}], 0x1, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:54 executing program 5: [ 348.900250] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:17:54 executing program 3 (fault-call:2 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 348.965507] print_req_error: I/O error, dev loop1, sector 128 15:17:54 executing program 5: 15:17:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0xfffffffffffffffc, 0x40) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x8, 0x30}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)={r2, 0x29, "4d776abe5a90e1ff025e5c721d105187289e812ecdcaed61e4839786eff9a94d9cd1a2bc5a1d6721b0"}, &(0x7f00000003c0)=0x31) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f0000000280)={0xd8c8, 0x0, 0x4, 0x20, {0x0, 0x7530}, {0x3, 0x1, 0x3, 0xffffffffffffff01, 0x8, 0x3, "e40ef3e8"}, 0x7, 0x3, @planes=&(0x7f00000001c0)={0x4, 0x7ff, @mem_offset=0x3, 0x7}, 0x4}) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r3, r3, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 349.039676] FAULT_INJECTION: forcing a failure. [ 349.039676] name failslab, interval 1, probability 0, space 0, times 0 [ 349.129778] CPU: 1 PID: 18890 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 349.137066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.137071] Call Trace: [ 349.137091] dump_stack+0x138/0x197 [ 349.137108] should_fail.cold+0x10f/0x159 [ 349.137121] should_failslab+0xdb/0x130 [ 349.161607] kmem_cache_alloc_trace+0x2e9/0x790 [ 349.166308] ? __lockdep_init_map+0x10c/0x570 [ 349.166326] ? loop_get_status64+0x120/0x120 [ 349.166337] __kthread_create_on_node+0xe3/0x3e0 [ 349.166347] ? kthread_park+0x140/0x140 [ 349.184648] ? __fget+0x210/0x370 [ 349.188125] ? loop_get_status64+0x120/0x120 [ 349.192547] kthread_create_on_node+0xa8/0xd0 [ 349.197092] ? __kthread_create_on_node+0x3e0/0x3e0 [ 349.202213] ? __lockdep_init_map+0x10c/0x570 [ 349.206811] lo_ioctl+0xcf7/0x1ce0 [ 349.210445] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 349.215568] ? loop_probe+0x160/0x160 [ 349.219387] blkdev_ioctl+0x96b/0x1860 [ 349.223506] ? blkpg_ioctl+0x980/0x980 [ 349.227504] ? __might_sleep+0x93/0xb0 [ 349.231408] ? __fget+0x210/0x370 [ 349.235048] block_ioctl+0xde/0x120 [ 349.238681] ? blkdev_fallocate+0x3b0/0x3b0 [ 349.243020] do_vfs_ioctl+0x7ae/0x1060 [ 349.246932] ? selinux_file_mprotect+0x5d0/0x5d0 [ 349.252061] ? lock_downgrade+0x6e0/0x6e0 [ 349.256347] ? ioctl_preallocate+0x1c0/0x1c0 [ 349.260764] ? __fget+0x237/0x370 [ 349.264329] ? security_file_ioctl+0x89/0xb0 [ 349.268852] SyS_ioctl+0x8f/0xc0 [ 349.272231] ? do_vfs_ioctl+0x1060/0x1060 [ 349.276579] do_syscall_64+0x1e8/0x640 [ 349.280483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.285341] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.290540] RIP: 0033:0x4596e7 [ 349.294091] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 349.301812] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 349.312916] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 349.320315] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 349.327599] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 349.335054] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:54 executing program 5: 15:17:54 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x2100, 0x0) write$selinux_attr(r0, &(0x7f00000003c0)='system_u:object_r:var_t:s0\x00', 0x1b) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) setsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000140)="b7700a792095ee573260f9e51a8229618d8f60065fbbc4db1474da9710a7764ed80c68ab628d4be7e33c674a0757aaf82c77210e9a58e1990f1cffdc5c0cc81de10f5401c123c2bbde5a10df78d37769ce5923fd08e17c7c68cd30ee4ea0dc7104bc210f3d416c33742e93a2c7f0cf9b380c6a305f93384170efeb752bfc944d7c8ce4cf369e8f3b0f85d2ea46904d39e2d760fa57c32a6a5b4552f3ad9aac3112fb10b0", 0xa4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getpeername$tipc(r1, &(0x7f0000000300)=@name, &(0x7f0000000340)=0x10) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000002c0)=0xa2d, 0x4) ioctl(r2, 0xe87, &(0x7f0000000000)="b0fad5781def6544c246748bc224a05ce1d47810eafba1dd8346e469") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfffffffffffffd68, 0xe69}], 0x0, 0x0) 15:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:54 executing program 3 (fault-call:2 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000080)=0xfffffffffffffff7, 0x43d6) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:54 executing program 5: [ 349.681775] FAULT_INJECTION: forcing a failure. [ 349.681775] name failslab, interval 1, probability 0, space 0, times 0 [ 349.706013] CPU: 1 PID: 18915 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 349.713256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.722703] Call Trace: [ 349.725301] dump_stack+0x138/0x197 [ 349.728978] should_fail.cold+0x10f/0x159 [ 349.733149] should_failslab+0xdb/0x130 [ 349.737134] kmem_cache_alloc+0x2d7/0x780 [ 349.741288] ? trace_hardirqs_on+0x10/0x10 [ 349.745622] ? save_trace+0x290/0x290 [ 349.745639] __kernfs_new_node+0x70/0x420 [ 349.745653] kernfs_new_node+0x80/0xf0 [ 349.745667] kernfs_create_dir_ns+0x41/0x140 [ 349.758027] internal_create_group+0xea/0x7b0 [ 349.758046] sysfs_create_group+0x20/0x30 [ 349.758056] lo_ioctl+0x1176/0x1ce0 [ 349.758068] ? loop_probe+0x160/0x160 [ 349.778500] blkdev_ioctl+0x96b/0x1860 15:17:54 executing program 5: [ 349.782403] ? blkpg_ioctl+0x980/0x980 [ 349.786307] ? __might_sleep+0x93/0xb0 [ 349.790206] ? __fget+0x210/0x370 [ 349.790223] block_ioctl+0xde/0x120 [ 349.790234] ? blkdev_fallocate+0x3b0/0x3b0 [ 349.790244] do_vfs_ioctl+0x7ae/0x1060 [ 349.790254] ? selinux_file_mprotect+0x5d0/0x5d0 [ 349.790264] ? lock_downgrade+0x6e0/0x6e0 [ 349.790273] ? ioctl_preallocate+0x1c0/0x1c0 [ 349.790282] ? __fget+0x237/0x370 [ 349.790297] ? security_file_ioctl+0x89/0xb0 [ 349.790307] SyS_ioctl+0x8f/0xc0 15:17:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 349.790316] ? do_vfs_ioctl+0x1060/0x1060 [ 349.790328] do_syscall_64+0x1e8/0x640 [ 349.790336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.790352] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.790359] RIP: 0033:0x4596e7 [ 349.790363] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 349.790372] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 349.790377] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 349.790382] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 349.790390] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 349.802006] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 349.871867] print_req_error: I/O error, dev loop2, sector 128 [ 349.905613] print_req_error: I/O error, dev loop0, sector 0 [ 349.926995] print_req_error: I/O error, dev loop0, sector 1024 15:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:17:55 executing program 3 (fault-call:2 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000080)='/dev/loop#\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x800000, &(0x7f0000000340)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x2}}, {@msize={'msize', 0x3d, 0x3}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@privport='privport'}, {@mmap='mmap'}], [{@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) r2 = fcntl$dupfd(r0, 0x0, r0) write$UHID_DESTROY(r2, &(0x7f0000000000), 0x4) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) connect$nfc_llcp(r2, &(0x7f0000000400)={0x27, 0x0, 0x1, 0x4, 0x12f5, 0x9, "092a28a8cc7ca1c4afdd53a64209c39eb50f3ff4fa655b43449c94f90bfd991ec2c41b75df73327d008d2f2eb1551463dd74a45e5d9930974d60e69886275e", 0x35}, 0x60) sendfile(r3, r3, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x7fff, 0x20000) 15:17:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r2, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x8]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRET={0x10, 0x4, [0xfff, 0x7, 0xfffffffffffffffc]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40090}, 0x40000) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x82) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x5) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = getuid() r6 = socket$inet(0x2, 0x200000002, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r8 = socket$l2tp(0x18, 0x1, 0x1) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r9, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r8, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) close(r6) ioctl$TUNSETOWNER(r4, 0x400454cc, r5) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 350.089894] FAULT_INJECTION: forcing a failure. [ 350.089894] name failslab, interval 1, probability 0, space 0, times 0 15:17:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 350.134320] CPU: 0 PID: 18947 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 350.141989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.151618] Call Trace: [ 350.151640] dump_stack+0x138/0x197 [ 350.151657] should_fail.cold+0x10f/0x159 [ 350.151672] should_failslab+0xdb/0x130 [ 350.151687] kmem_cache_alloc+0x2d7/0x780 [ 350.162060] ? __mutex_unlock_slowpath+0x71/0x800 [ 350.162073] ? __lock_is_held+0xb6/0x140 [ 350.162088] __kernfs_new_node+0x70/0x420 15:17:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 350.162099] kernfs_new_node+0x80/0xf0 [ 350.162110] __kernfs_create_file+0x46/0x323 [ 350.162121] sysfs_add_file_mode_ns+0x1e4/0x450 [ 350.162133] internal_create_group+0x232/0x7b0 [ 350.201774] sysfs_create_group+0x20/0x30 [ 350.206073] lo_ioctl+0x1176/0x1ce0 [ 350.209719] ? loop_probe+0x160/0x160 [ 350.209732] blkdev_ioctl+0x96b/0x1860 [ 350.217751] ? blkpg_ioctl+0x980/0x980 [ 350.217770] ? __might_sleep+0x93/0xb0 [ 350.217780] ? __fget+0x210/0x370 [ 350.217792] block_ioctl+0xde/0x120 15:17:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 350.232643] ? blkdev_fallocate+0x3b0/0x3b0 [ 350.236988] do_vfs_ioctl+0x7ae/0x1060 [ 350.240895] ? selinux_file_mprotect+0x5d0/0x5d0 [ 350.245668] ? lock_downgrade+0x6e0/0x6e0 [ 350.249870] ? ioctl_preallocate+0x1c0/0x1c0 [ 350.254314] ? __fget+0x237/0x370 [ 350.257959] ? security_file_ioctl+0x89/0xb0 [ 350.262568] SyS_ioctl+0x8f/0xc0 [ 350.265942] ? do_vfs_ioctl+0x1060/0x1060 [ 350.270103] do_syscall_64+0x1e8/0x640 [ 350.274021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.274038] entry_SYSCALL_64_after_hwframe+0x42/0xb7 15:17:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x1, &(0x7f0000000000)=0xfffffffffffffff6, 0x6) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x200802, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000280), 0x4) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9, 0x200) ioctl$CAPI_GET_SERIAL(r3, 0xc0044308, &(0x7f00000001c0)=0x1) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r0, 0x0, 0x7ff) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 350.284309] RIP: 0033:0x4596e7 [ 350.284315] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.284323] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 350.284328] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 350.284332] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 350.284337] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 350.284341] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:55 executing program 3 (fault-call:2 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000080)={0x2, {0x38e3, 0x100000001, 0x9, 0xfffffffffffffff7}}) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) bind$netlink(r1, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbfe, 0x4000000}, 0xc) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:17:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "3da9466dcb0369768a8cd79fbc5f67e151836275"}, 0x15, 0x3) 15:17:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x29, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r0, 0x400002, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680), 0x1097, 0x1081804) r2 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000200)='trusted\x00', &(0x7f0000000280)='/dev/loop#\x00') sendfile(r1, r1, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 350.596952] FAULT_INJECTION: forcing a failure. [ 350.596952] name failslab, interval 1, probability 0, space 0, times 0 [ 350.616792] CPU: 1 PID: 19008 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 350.624056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.634045] Call Trace: [ 350.636652] dump_stack+0x138/0x197 [ 350.640317] should_fail.cold+0x10f/0x159 [ 350.644569] should_failslab+0xdb/0x130 [ 350.648559] kmem_cache_alloc+0x2d7/0x780 [ 350.653000] ? wait_for_completion+0x420/0x420 [ 350.658102] __kernfs_new_node+0x70/0x420 [ 350.662271] kernfs_new_node+0x80/0xf0 [ 350.666171] __kernfs_create_file+0x46/0x323 [ 350.670684] sysfs_add_file_mode_ns+0x1e4/0x450 [ 350.675367] internal_create_group+0x232/0x7b0 [ 350.679958] sysfs_create_group+0x20/0x30 [ 350.679971] lo_ioctl+0x1176/0x1ce0 [ 350.679983] ? loop_probe+0x160/0x160 [ 350.687934] blkdev_ioctl+0x96b/0x1860 [ 350.687945] ? blkpg_ioctl+0x980/0x980 [ 350.687961] ? __might_sleep+0x93/0xb0 [ 350.687972] ? __fget+0x210/0x370 [ 350.696174] block_ioctl+0xde/0x120 [ 350.696185] ? blkdev_fallocate+0x3b0/0x3b0 [ 350.696194] do_vfs_ioctl+0x7ae/0x1060 [ 350.696208] ? selinux_file_mprotect+0x5d0/0x5d0 [ 350.703955] ? lock_downgrade+0x6e0/0x6e0 [ 350.703969] ? ioctl_preallocate+0x1c0/0x1c0 [ 350.703981] ? __fget+0x237/0x370 [ 350.703998] ? security_file_ioctl+0x89/0xb0 [ 350.740976] SyS_ioctl+0x8f/0xc0 [ 350.744360] ? do_vfs_ioctl+0x1060/0x1060 [ 350.748532] do_syscall_64+0x1e8/0x640 [ 350.752435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.757333] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.762550] RIP: 0033:0x4596e7 [ 350.765730] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.773427] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 350.780747] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 350.788002] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 15:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 350.795271] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 350.802848] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:17:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x52000, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000080)) sendfile(r1, r1, 0x0, 0x200000d) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f00000001c0)={'vlan0\x00'}) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1820}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, r3, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xd0}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x30}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 350.953980] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:17:56 executing program 3 (fault-call:2 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:56 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000600)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="4177bc816d19dc74a568a0bfedc95107da5258c999b58c6abf9a091b3955bad5a35d8a8a408fbf392fdc11a058f39001aa984aed62317bf601e307a5f2799dbd2f3e699c22bc771bd93d435d", 0x4c, 0x4}, {&(0x7f0000000300)="8fb2a03494de11a101620158f98da7270e429bb63a8061bade6860e8ca7048d70727d1fc911570981c929e146e37c4f05746ceb45b4489131badbf28f67bd1d607e772df2e64702a519d7150e263431a36d805d1da45cc231368bbf22b20fec5ac6bdb612be1f42a23e4281ab48da0cafe5984939a755e4040bd3c4ec4e4278b8c82ff21698121a5270505", 0x8b, 0x80000000}, {&(0x7f00000003c0)="9186da3ab59c0d91737b9195a3ead080b21ebf87f00b9415b602cbda2d5007bb458d365c6754e6e1c529d1437b5b196da476119be15bc061ddced6a49adcdaf8f4c33dd9647c1b7d9de8e306e22b7c2b4dffc1a0925a9fa83ed4dd671e34345c685eec29b062cb879779237b54c6414d7ddd2485ad50d5d7e43c079ea895f501ab66ee50915d790e7ba97133fd1e1c32ab607a533e1799c4250ab2b4329d7ab6d9b056bc1474bc288c", 0xa9, 0xfae8}], 0x4, &(0x7f00000007c0)={[{@uid={'uid', 0x3d, r2}}, {@noquota='noquota'}, {@gid={'gid', 0x3d, r3}}, {@resize='resize'}, {@quota='quota'}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x30, 0x30, 0x64, 0x3b, 0x65, 0xb27a1b10c657f1a3, 0xb0402888f23a0d85], 0x2d, [0x37, 0x38, 0x30, 0x63], 0x2d, [0x30, 0x7f, 0x7f, 0x66], 0x2d, [0x39, 0x66, 0x62, 0x33], 0x2d, [0x33, 0x73, 0x37, 0x65, 0x32, 0x35, 0x35]}}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop#\x00'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@uid_gt={'uid>', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x34, 0x39, 0x65, 0x0, 0x34, 0x33, 0x35], 0x2d, [0x37, 0x63, 0x37, 0x66], 0x2d, [0x38, 0x31, 0x33, 0x35], 0x2d, [0x31, 0x31, 0x64, 0x36], 0x2d, [0x31, 0x63, 0x31, 0x0, 0x35, 0x61, 0x34]}}}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}]}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4040, 0x0) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000940)='trusted.overlay.nlink\x00', &(0x7f0000000980)={'L+', 0x8001}, 0x28, 0x2) accept4$vsock_stream(r5, &(0x7f0000000080)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x800) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r6 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r6, r6, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$KDENABIO(r5, 0x4b36) [ 351.060804] FAULT_INJECTION: forcing a failure. [ 351.060804] name failslab, interval 1, probability 0, space 0, times 0 [ 351.072352] CPU: 0 PID: 19063 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 351.079557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.088917] Call Trace: [ 351.088938] dump_stack+0x138/0x197 [ 351.088957] should_fail.cold+0x10f/0x159 [ 351.088973] should_failslab+0xdb/0x130 [ 351.088988] kmem_cache_alloc+0x2d7/0x780 [ 351.108061] ? wait_for_completion+0x420/0x420 [ 351.112655] __kernfs_new_node+0x70/0x420 [ 351.116807] kernfs_new_node+0x80/0xf0 [ 351.120715] __kernfs_create_file+0x46/0x323 [ 351.125132] sysfs_add_file_mode_ns+0x1e4/0x450 [ 351.130174] internal_create_group+0x232/0x7b0 [ 351.134795] sysfs_create_group+0x20/0x30 [ 351.134808] lo_ioctl+0x1176/0x1ce0 [ 351.134823] ? loop_probe+0x160/0x160 [ 351.134836] blkdev_ioctl+0x96b/0x1860 [ 351.134847] ? blkpg_ioctl+0x980/0x980 [ 351.142711] ? __might_sleep+0x93/0xb0 15:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) [ 351.142719] ? __fget+0x210/0x370 [ 351.142731] block_ioctl+0xde/0x120 [ 351.142740] ? blkdev_fallocate+0x3b0/0x3b0 [ 351.142749] do_vfs_ioctl+0x7ae/0x1060 [ 351.142761] ? selinux_file_mprotect+0x5d0/0x5d0 [ 351.142772] ? lock_downgrade+0x6e0/0x6e0 [ 351.142782] ? ioctl_preallocate+0x1c0/0x1c0 [ 351.142793] ? __fget+0x237/0x370 [ 351.142807] ? security_file_ioctl+0x89/0xb0 [ 351.142819] SyS_ioctl+0x8f/0xc0 [ 351.159541] jfs: Unrecognized mount option "fsuuid=c00d;e£…-780c-0f-9fb3-3s7e255" or missing value [ 351.162021] ? do_vfs_ioctl+0x1060/0x1060 [ 351.162035] do_syscall_64+0x1e8/0x640 [ 351.162045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.162063] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.162072] RIP: 0033:0x4596e7 [ 351.162078] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 351.162089] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 351.162094] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 351.162098] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 351.162102] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 351.162107] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:17:56 executing program 3 (fault-call:2 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000140)="96dcf4b83d8c11bd108f67d35ac0150f949439548be59bfc7876ccf79ca01133a8d7011e9a805b520deb2bea7b9930b104518790e8d5ed3814fbea5305b1ad04019243290a8d3d6a5f3229c4b02bb9fb8f0cfb9e156bcbef7707dfae32f62a3997e79e7208a285ef2a769a5b524b168874d3c616f66f375ba620b26521569715ea2d0351787530cb13ef4663") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r0, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1000, 0x8000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000001c0)=0x4) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 351.618103] FAULT_INJECTION: forcing a failure. [ 351.618103] name failslab, interval 1, probability 0, space 0, times 0 [ 351.664952] CPU: 0 PID: 19103 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 351.672115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.681587] Call Trace: [ 351.681605] dump_stack+0x138/0x197 [ 351.681623] should_fail.cold+0x10f/0x159 [ 351.687849] should_failslab+0xdb/0x130 [ 351.687865] kmem_cache_alloc+0x2d7/0x780 [ 351.687880] ? wait_for_completion+0x420/0x420 [ 351.704891] __kernfs_new_node+0x70/0x420 [ 351.709845] kernfs_new_node+0x80/0xf0 [ 351.713748] __kernfs_create_file+0x46/0x323 [ 351.718171] sysfs_add_file_mode_ns+0x1e4/0x450 [ 351.722857] internal_create_group+0x232/0x7b0 [ 351.727472] sysfs_create_group+0x20/0x30 [ 351.727483] lo_ioctl+0x1176/0x1ce0 [ 351.727495] ? loop_probe+0x160/0x160 [ 351.735300] blkdev_ioctl+0x96b/0x1860 [ 351.735310] ? blkpg_ioctl+0x980/0x980 [ 351.735331] ? __might_sleep+0x93/0xb0 [ 351.751381] ? __fget+0x210/0x370 [ 351.754931] block_ioctl+0xde/0x120 [ 351.758547] ? blkdev_fallocate+0x3b0/0x3b0 [ 351.763031] do_vfs_ioctl+0x7ae/0x1060 [ 351.766908] ? selinux_file_mprotect+0x5d0/0x5d0 [ 351.771653] ? lock_downgrade+0x6e0/0x6e0 [ 351.775792] ? ioctl_preallocate+0x1c0/0x1c0 [ 351.780211] ? __fget+0x237/0x370 [ 351.783676] ? security_file_ioctl+0x89/0xb0 [ 351.788077] SyS_ioctl+0x8f/0xc0 [ 351.791428] ? do_vfs_ioctl+0x1060/0x1060 [ 351.795568] do_syscall_64+0x1e8/0x640 [ 351.799557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.804422] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.809686] RIP: 0033:0x4596e7 15:17:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x2, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0xffffffffc, 0x3, 0x0, 0x6, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8244333e5cd543f10797db1079d5bc87f576e9c84", [0x1ff]}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x121100, 0x0) [ 351.812861] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 351.820626] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 351.828156] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 351.835520] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 351.842881] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 351.850746] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3f, 0x602c00) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080)=0xa, 0x4) socket$vsock_stream(0x28, 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:57 executing program 3 (fault-call:2 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0b") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x20000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x210000) write$FUSE_OPEN(r1, &(0x7f00000000c0)={0x20, 0x0, 0x1}, 0x20) 15:17:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80000001, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x260400) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x5, 0x4) fcntl$getflags(r1, 0x408) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) get_thread_area(&(0x7f0000000280)={0x1, 0x0, 0x0, 0x55, 0x1000, 0x7, 0x0, 0x5, 0x401, 0x8}) sendfile(r1, r1, 0x0, 0x200000d) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x8) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f00000001c0)="1e5617048ce3741cc053533036c67fa5f31ddbbdfec04bd2c5a7303f088e663fcc4eb426bbbaa46fb8d033e41c7f969cfb") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x3) 15:17:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00001458328712c94534d38901000000000001000000000000005f42485266535f4d", 0x52, 0x10000}], 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2000, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000300)={0x7, 0x6, 0x1, 'queue0\x00', 0x9}) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x8000}, 0x28, 0x2) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000000c0)={0x0, 0x5, 0x0, 0x4}) accept$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) [ 352.367485] FAULT_INJECTION: forcing a failure. [ 352.367485] name failslab, interval 1, probability 0, space 0, times 0 [ 352.439248] CPU: 0 PID: 19182 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 352.446399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.446404] Call Trace: [ 352.446425] dump_stack+0x138/0x197 [ 352.446444] should_fail.cold+0x10f/0x159 [ 352.446461] should_failslab+0xdb/0x130 [ 352.446475] kmem_cache_alloc+0x2d7/0x780 [ 352.446485] ? wait_for_completion+0x420/0x420 [ 352.446501] __kernfs_new_node+0x70/0x420 [ 352.458458] kernfs_new_node+0x80/0xf0 [ 352.458472] __kernfs_create_file+0x46/0x323 [ 352.458484] sysfs_add_file_mode_ns+0x1e4/0x450 [ 352.458500] internal_create_group+0x232/0x7b0 [ 352.500596] sysfs_create_group+0x20/0x30 [ 352.504752] lo_ioctl+0x1176/0x1ce0 [ 352.508419] ? loop_probe+0x160/0x160 [ 352.512239] blkdev_ioctl+0x96b/0x1860 [ 352.516122] ? blkpg_ioctl+0x980/0x980 [ 352.519999] ? __might_sleep+0x93/0xb0 [ 352.523901] ? __fget+0x210/0x370 [ 352.527346] block_ioctl+0xde/0x120 [ 352.530962] ? blkdev_fallocate+0x3b0/0x3b0 [ 352.535285] do_vfs_ioctl+0x7ae/0x1060 [ 352.539177] ? selinux_file_mprotect+0x5d0/0x5d0 [ 352.544131] ? lock_downgrade+0x6e0/0x6e0 [ 352.548299] ? ioctl_preallocate+0x1c0/0x1c0 [ 352.552703] ? __fget+0x237/0x370 [ 352.556208] ? security_file_ioctl+0x89/0xb0 [ 352.560606] SyS_ioctl+0x8f/0xc0 [ 352.563958] ? do_vfs_ioctl+0x1060/0x1060 [ 352.568106] do_syscall_64+0x1e8/0x640 [ 352.572011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.576853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.582492] RIP: 0033:0x4596e7 15:17:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000200)={r1, 0xe6, 0x68}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'sha1-avx\x00'}}, &(0x7f0000000300)="a3e08d55c0215f0f8d52b0e95edbff3501727e8569fdca60d1d4a11904fce29987e7778835c8829ff46baafc7ce895c248606ee7d8f7277ab28e62cf97162c5c62d5a871774368579a2f0e03da8b61b86dc0eb9d7ae2107e95e859ce1e364366b5c97f09b1d5686b941ca63fb82c2b9fac9964a134f6c2148db09aa5ab414d2c7aab08231f005f27484be33f1abd54d0a4e483bff147f8373f1ec325dab53b4413de8f84e7d9a86039eda80ba832d85dba16027248851b3e9982a42765ad364f1785d32d82b457f7928fa53bf503284be81a1f76f5c20725e139c54b2fe2e620d2780bdb1e33", &(0x7f0000000400)=""/104) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 352.585677] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 352.593371] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 352.600625] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 352.607883] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 352.615143] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 352.622408] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 352.650422] loop_set_status: loop0 () has still dirty pages (nrpages=320) [ 352.660383] print_req_error: 4 callbacks suppressed [ 352.660389] print_req_error: I/O error, dev loop2, sector 128 [ 352.684776] print_req_error: I/O error, dev loop1, sector 128 15:17:57 executing program 3 (fault-call:2 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 352.897964] FAULT_INJECTION: forcing a failure. [ 352.897964] name failslab, interval 1, probability 0, space 0, times 0 [ 352.911516] CPU: 1 PID: 19231 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 352.918650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.928099] Call Trace: [ 352.930709] dump_stack+0x138/0x197 [ 352.934351] should_fail.cold+0x10f/0x159 [ 352.938516] should_failslab+0xdb/0x130 [ 352.942593] kmem_cache_alloc_trace+0x2e9/0x790 [ 352.947281] ? kernfs_put+0x35e/0x490 [ 352.951091] ? sysfs_add_file_mode_ns+0x1e4/0x450 [ 352.955936] ? devm_device_remove_groups+0x50/0x50 [ 352.960874] kobject_uevent_env+0x378/0xc23 [ 352.965202] ? internal_create_group+0x49a/0x7b0 [ 352.969975] kobject_uevent+0x20/0x26 [ 352.973786] lo_ioctl+0x11e7/0x1ce0 [ 352.977460] ? loop_probe+0x160/0x160 [ 352.981273] blkdev_ioctl+0x96b/0x1860 [ 352.985170] ? blkpg_ioctl+0x980/0x980 [ 352.989076] ? __might_sleep+0x93/0xb0 [ 352.993086] ? __fget+0x210/0x370 [ 352.996578] block_ioctl+0xde/0x120 [ 353.000299] ? blkdev_fallocate+0x3b0/0x3b0 [ 353.004632] do_vfs_ioctl+0x7ae/0x1060 [ 353.008531] ? selinux_file_mprotect+0x5d0/0x5d0 [ 353.013293] ? lock_downgrade+0x6e0/0x6e0 [ 353.017447] ? ioctl_preallocate+0x1c0/0x1c0 [ 353.021905] ? __fget+0x237/0x370 [ 353.025579] ? security_file_ioctl+0x89/0xb0 [ 353.030001] SyS_ioctl+0x8f/0xc0 [ 353.033369] ? do_vfs_ioctl+0x1060/0x1060 [ 353.037630] do_syscall_64+0x1e8/0x640 [ 353.041529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.046389] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.051592] RIP: 0033:0x4596e7 [ 353.054786] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.062588] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 353.069875] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 353.077189] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 353.084480] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 353.091759] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 353.100926] print_req_error: I/O error, dev loop1, sector 128 15:17:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0b") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x3, 0x1, 0xfff, 0x3, r1}) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x9, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x200041, 0x0) sendfile(r3, r3, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) r5 = shmget(0x2, 0x4000, 0x54000000, &(0x7f0000ffc000/0x4000)=nil) r6 = getuid() fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000440)={{0x1ff, r6, r7, r8, r9, 0x138, 0x6}, 0x1f, 0x7ff, 0xfff, 0x1000, r1, r1, 0x2ae}) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f00000004c0)) 15:17:58 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xe00000, 0x40000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) 15:17:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:58 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = dup2(r1, r0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) sendfile(r1, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:58 executing program 3 (fault-call:2 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:58 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 353.303521] print_req_error: I/O error, dev loop2, sector 128 15:17:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xe9, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000001c0)={{0x2c, @remote, 0x4e23, 0x2, 'ovf\x00', 0x26, 0x4, 0x79}, {@local, 0x4e23, 0x2, 0x800, 0x5, 0x5}}, 0x44) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000000c0)) 15:17:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0b") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 353.465021] IPVS: set_ctl: invalid protocol: 44 172.20.20.187:20003 [ 353.476616] FAULT_INJECTION: forcing a failure. [ 353.476616] name failslab, interval 1, probability 0, space 0, times 0 [ 353.526143] CPU: 1 PID: 19275 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 353.533289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.542662] Call Trace: [ 353.545259] dump_stack+0x138/0x197 [ 353.548902] should_fail.cold+0x10f/0x159 [ 353.553065] should_failslab+0xdb/0x130 [ 353.557057] kmem_cache_alloc+0x2d7/0x780 [ 353.561580] ? wait_for_completion+0x420/0x420 [ 353.566182] __kernfs_new_node+0x70/0x420 [ 353.570343] kernfs_new_node+0x80/0xf0 [ 353.574246] __kernfs_create_file+0x46/0x323 [ 353.578671] sysfs_add_file_mode_ns+0x1e4/0x450 [ 353.583448] internal_create_group+0x232/0x7b0 [ 353.588046] sysfs_create_group+0x20/0x30 [ 353.592203] lo_ioctl+0x1176/0x1ce0 [ 353.595843] ? loop_probe+0x160/0x160 [ 353.599669] blkdev_ioctl+0x96b/0x1860 [ 353.603576] ? blkpg_ioctl+0x980/0x980 [ 353.607483] ? __might_sleep+0x93/0xb0 [ 353.611376] ? __fget+0x210/0x370 [ 353.614846] block_ioctl+0xde/0x120 [ 353.618479] ? blkdev_fallocate+0x3b0/0x3b0 [ 353.622804] do_vfs_ioctl+0x7ae/0x1060 [ 353.626699] ? selinux_file_mprotect+0x5d0/0x5d0 [ 353.631463] ? lock_downgrade+0x6e0/0x6e0 [ 353.635623] ? ioctl_preallocate+0x1c0/0x1c0 [ 353.640042] ? __fget+0x237/0x370 [ 353.643518] ? security_file_ioctl+0x89/0xb0 [ 353.647947] SyS_ioctl+0x8f/0xc0 [ 353.651319] ? do_vfs_ioctl+0x1060/0x1060 [ 353.655478] do_syscall_64+0x1e8/0x640 [ 353.659467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.664358] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.669574] RIP: 0033:0x4596e7 [ 353.672770] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.680524] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 353.687891] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 353.695169] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 353.702547] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 353.709833] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 353.752396] IPVS: set_ctl: invalid protocol: 44 172.20.20.187:20003 15:17:58 executing program 3 (fault-call:2 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:17:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 353.811200] print_req_error: I/O error, dev loop1, sector 128 15:17:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 15:17:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x0, 0x4, 0x60000000000000}) [ 353.870760] FAULT_INJECTION: forcing a failure. [ 353.870760] name failslab, interval 1, probability 0, space 0, times 0 15:17:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$rose(r2, 0x104, 0x71079d4e538c01f4, &(0x7f0000000040)=0x1, 0x4) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000080)) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x68fce6ca, 0x1ff, 0x0, 0x4, 0x13, 0x4, "7b207ac9a0027daa9058816b3067db74a57c2f7c5078ac8b05b90301288b1c85527206c1169f1c0b405499fc0b9628deb766a93dfc9b86a08c37c63c476d2fba", "960ef785f34eef4602ecf15425ffd9f13cd4e85f64ecdbb0eb5734cb888639b30c00a86304bc947e21dd3624984d68f806d7871aba14289af5b23387c43e317a", "1032cc265928d59976e360da3cf6a3fbfce60a6d7aa87682e982407dc30386c2", [0x7fffffff, 0x6]}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000902}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r3, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008881}, 0x804) ftruncate(r1, 0x42) [ 353.937672] CPU: 0 PID: 19316 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 353.944824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.954187] Call Trace: [ 353.956780] dump_stack+0x138/0x197 [ 353.956800] should_fail.cold+0x10f/0x159 [ 353.956814] should_failslab+0xdb/0x130 [ 353.956825] kmem_cache_alloc_node+0x287/0x780 [ 353.956841] __alloc_skb+0x9c/0x500 [ 353.956851] ? skb_scrub_packet+0x4b0/0x4b0 [ 353.956863] ? netlink_has_listeners+0x20a/0x330 [ 353.956875] kobject_uevent_env+0x781/0xc23 [ 353.964660] ? internal_create_group+0x49a/0x7b0 [ 353.964680] kobject_uevent+0x20/0x26 [ 353.964692] lo_ioctl+0x11e7/0x1ce0 [ 353.964705] ? loop_probe+0x160/0x160 [ 354.006328] blkdev_ioctl+0x96b/0x1860 [ 354.010205] ? blkpg_ioctl+0x980/0x980 [ 354.014095] ? __might_sleep+0x93/0xb0 [ 354.017966] ? __fget+0x210/0x370 [ 354.021408] block_ioctl+0xde/0x120 [ 354.025020] ? blkdev_fallocate+0x3b0/0x3b0 [ 354.029462] do_vfs_ioctl+0x7ae/0x1060 [ 354.033449] ? selinux_file_mprotect+0x5d0/0x5d0 [ 354.038195] ? lock_downgrade+0x6e0/0x6e0 [ 354.042356] ? ioctl_preallocate+0x1c0/0x1c0 [ 354.046761] ? __fget+0x237/0x370 [ 354.050205] ? security_file_ioctl+0x89/0xb0 [ 354.054631] SyS_ioctl+0x8f/0xc0 [ 354.058020] ? do_vfs_ioctl+0x1060/0x1060 [ 354.062223] do_syscall_64+0x1e8/0x640 [ 354.066196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.071113] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.076299] RIP: 0033:0x4596e7 [ 354.079493] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:17:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 354.087191] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 354.094467] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 354.101733] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 354.108993] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 354.116361] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 354.170251] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:17:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:17:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0xe}, 0x7fff}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x7, @empty, 0x200}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}], 0x68) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x800}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)={r3, 0x3054, 0x7, [0xffffffffffffffff, 0x63, 0x2392a82, 0xdf, 0x2, 0x18bb, 0xfffffffffffffbff]}, 0x16) 15:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:17:59 executing program 3 (fault-call:2 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 354.371331] print_req_error: I/O error, dev loop2, sector 128 15:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 354.438873] FAULT_INJECTION: forcing a failure. [ 354.438873] name failslab, interval 1, probability 0, space 0, times 0 [ 354.458090] CPU: 0 PID: 19367 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 354.465237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.474595] Call Trace: [ 354.477174] dump_stack+0x138/0x197 [ 354.480911] should_fail.cold+0x10f/0x159 [ 354.485058] should_failslab+0xdb/0x130 [ 354.489059] kmem_cache_alloc_node+0x287/0x780 [ 354.493644] __alloc_skb+0x9c/0x500 [ 354.497305] ? skb_scrub_packet+0x4b0/0x4b0 [ 354.501619] ? netlink_has_listeners+0x20a/0x330 [ 354.506392] kobject_uevent_env+0x781/0xc23 [ 354.510709] ? internal_create_group+0x49a/0x7b0 [ 354.515473] kobject_uevent+0x20/0x26 [ 354.519262] lo_ioctl+0x11e7/0x1ce0 [ 354.522871] ? loop_probe+0x160/0x160 [ 354.526657] blkdev_ioctl+0x96b/0x1860 [ 354.530558] ? blkpg_ioctl+0x980/0x980 [ 354.534466] ? __might_sleep+0x93/0xb0 [ 354.538377] ? __fget+0x210/0x370 [ 354.541825] block_ioctl+0xde/0x120 [ 354.545441] ? blkdev_fallocate+0x3b0/0x3b0 [ 354.549761] do_vfs_ioctl+0x7ae/0x1060 [ 354.553645] ? selinux_file_mprotect+0x5d0/0x5d0 [ 354.558391] ? lock_downgrade+0x6e0/0x6e0 [ 354.562529] ? ioctl_preallocate+0x1c0/0x1c0 [ 354.566931] ? __fget+0x237/0x370 [ 354.570494] ? security_file_ioctl+0x89/0xb0 [ 354.574921] SyS_ioctl+0x8f/0xc0 [ 354.578275] ? do_vfs_ioctl+0x1060/0x1060 [ 354.582428] do_syscall_64+0x1e8/0x640 [ 354.586376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.591301] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.596480] RIP: 0033:0x4596e7 [ 354.599665] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 354.607376] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 354.614641] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 354.621907] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 354.629164] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 15:17:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x100000018, 0x2, 0x3}}, 0x14) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmdt(r1) 15:17:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 354.636421] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:17:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 354.670182] loop_set_status: loop0 () has still dirty pages (nrpages=163) [ 354.701318] print_req_error: I/O error, dev loop2, sector 128 15:17:59 executing program 3 (fault-call:2 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:17:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 354.845471] FAULT_INJECTION: forcing a failure. [ 354.845471] name failslab, interval 1, probability 0, space 0, times 0 [ 354.884032] CPU: 0 PID: 19393 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 354.891348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.900792] Call Trace: [ 354.900814] dump_stack+0x138/0x197 [ 354.900831] should_fail.cold+0x10f/0x159 [ 354.900845] should_failslab+0xdb/0x130 [ 354.900861] kmem_cache_alloc_node+0x287/0x780 [ 354.919849] __alloc_skb+0x9c/0x500 [ 354.923504] ? skb_scrub_packet+0x4b0/0x4b0 [ 354.927851] ? netlink_has_listeners+0x20a/0x330 [ 354.932632] kobject_uevent_env+0x781/0xc23 [ 354.937053] ? internal_create_group+0x49a/0x7b0 [ 354.941832] kobject_uevent+0x20/0x26 [ 354.945645] lo_ioctl+0x11e7/0x1ce0 [ 354.949333] ? loop_probe+0x160/0x160 [ 354.953181] blkdev_ioctl+0x96b/0x1860 [ 354.957083] ? blkpg_ioctl+0x980/0x980 [ 354.960990] ? __might_sleep+0x93/0xb0 [ 354.964887] ? __fget+0x210/0x370 [ 354.968355] block_ioctl+0xde/0x120 [ 354.971996] ? blkdev_fallocate+0x3b0/0x3b0 [ 354.976337] do_vfs_ioctl+0x7ae/0x1060 [ 354.980237] ? selinux_file_mprotect+0x5d0/0x5d0 [ 354.985090] ? lock_downgrade+0x6e0/0x6e0 [ 354.989255] ? ioctl_preallocate+0x1c0/0x1c0 [ 354.993783] ? __fget+0x237/0x370 [ 354.997253] ? security_file_ioctl+0x89/0xb0 [ 355.001678] SyS_ioctl+0x8f/0xc0 [ 355.005065] ? do_vfs_ioctl+0x1060/0x1060 [ 355.009231] do_syscall_64+0x1e8/0x640 [ 355.013133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.018429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.023836] RIP: 0033:0x4596e7 [ 355.027028] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.034754] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 15:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 355.042035] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 355.049316] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 355.056598] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 355.063878] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 355.117608] print_req_error: I/O error, dev loop2, sector 128 15:18:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = accept4(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000000)=0x80, 0x80000) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r3 = msgget(0x2, 0x4) msgsnd(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000000000000c9085b5cd5dda6088e6dc2e4b251f17b0e474694e7ae42d7a1c039a47ba2739f1dffc19073ab287922f59aa3c2a9fe3dfd42481d78674f548123a0724211dfd7798afd693bdd95d6bd3644c245ea3e9facc5c9a765bbe1e558e9914e6dc5ec810382780dc0e03122993e265321d0408e5139eb329c4fea8d9a18fc049ebd2337b504495f9f1e8ac84e75c8d184bbe65e976c3912468cb631465ff83c6d87479b1cd7a5f2f6e025599e76d84d0a2226e4ebcc918bfba3e3eac6e7276ac6"], 0xb7, 0x800) sendfile(r2, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000340)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45c9dd3fa63214a07d8020000e5cd543f10797db107a65bc87f576e5c84", [0x4]}) 15:18:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x321080, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x7, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x7d01402f490b9b08}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, r2, 0x30, 0x1, @in6={0xa, 0x4e20, 0x7, @remote, 0x1}}}, 0xa0) 15:18:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:00 executing program 3 (fault-call:2 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) socket$rxrpc(0x21, 0x2, 0x2) 15:18:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf07073d6598f248a8c70a39843fd54f81c4408f7d4e31fbf85ed8b8b71fed10d93c721d0a8b4b50e611ceeeeb9be8fdc6f1a1db533dafc2d6e36") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x2) [ 355.480693] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:18:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x104, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000080)=0x81) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) sendfile(r2, r2, 0x0, 0x200000d) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @rand_addr="72bab9af9c7ad232de7a7354190728e1", 0xffffffff}, {0xa, 0x4e24, 0x6, @loopback, 0xfffffffffffffffa}, r5, 0x9}}, 0x48) rt_tgsigqueueinfo(r3, r4, 0x1c, &(0x7f0000000280)={0x33, 0x2e80dfc, 0x20}) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 355.538259] FAULT_INJECTION: forcing a failure. [ 355.538259] name failslab, interval 1, probability 0, space 0, times 0 [ 355.598564] CPU: 1 PID: 19448 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 355.605716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.615099] Call Trace: [ 355.617703] dump_stack+0x138/0x197 [ 355.621432] should_fail.cold+0x10f/0x159 [ 355.625597] should_failslab+0xdb/0x130 [ 355.629590] kmem_cache_alloc_node+0x287/0x780 [ 355.634199] __alloc_skb+0x9c/0x500 [ 355.637834] ? skb_scrub_packet+0x4b0/0x4b0 [ 355.642164] ? netlink_has_listeners+0x20a/0x330 [ 355.646934] kobject_uevent_env+0x781/0xc23 [ 355.651276] kobject_uevent+0x20/0x26 [ 355.655085] lo_ioctl+0x11e7/0x1ce0 [ 355.658722] ? loop_probe+0x160/0x160 [ 355.662532] blkdev_ioctl+0x96b/0x1860 [ 355.666424] ? blkpg_ioctl+0x980/0x980 [ 355.670321] ? __might_sleep+0x93/0xb0 [ 355.674208] ? __fget+0x210/0x370 [ 355.677672] block_ioctl+0xde/0x120 [ 355.681309] ? blkdev_fallocate+0x3b0/0x3b0 [ 355.685638] do_vfs_ioctl+0x7ae/0x1060 [ 355.689539] ? selinux_file_mprotect+0x5d0/0x5d0 [ 355.694305] ? lock_downgrade+0x6e0/0x6e0 [ 355.698573] ? ioctl_preallocate+0x1c0/0x1c0 [ 355.702999] ? __fget+0x237/0x370 [ 355.706470] ? security_file_ioctl+0x89/0xb0 [ 355.710887] SyS_ioctl+0x8f/0xc0 [ 355.714258] ? do_vfs_ioctl+0x1060/0x1060 [ 355.718430] do_syscall_64+0x1e8/0x640 [ 355.722322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.727186] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.732386] RIP: 0033:0x4596e7 [ 355.735602] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:18:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 355.743460] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 355.750737] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 355.758015] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 355.765312] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 355.772588] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x0, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x42040, 0x0) ioctl$VFIO_GET_API_VERSION(r1, 0x3b64) sendto$inet(r1, &(0x7f0000000280)="c0ea9f3c6117bd7440a126a6caaa3cba1ee7f3d031dc239b999dc3816ca0ea509dabc02071056f73bade3dd057aee7fb0108758826adea0e1fc4394b7d4255959267dec408c061d4923f28003d50869d03e72b5903978d6b9f748daf618e1dbd06273b09fa34cdc29dea1fb9e2e3a3e91e5ae33db4903f26ad1c055c5d2fcad3c68104a29cb7bf3afa00d935fdb91aeef0c922b21d808a1cb749ffddd3f6f17a412e657dba88c10213e76a743b9a70a5f4c29e719a3594d2be146c870e29ebc41b12e3a2ea3fc408286c96002634443c4a058bc0033f6a6337534c4457929b933b5072724d9ced88", 0xe8, 0x20008010, &(0x7f0000000080)={0x2, 0x4e24, @broadcast}, 0x10) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:01 executing program 3 (fault-call:2 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0), 0x4) syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x204000, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x200000) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000140)='btrfs\x00', 0x6, 0x0) 15:18:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x0, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x1, 0x0) accept4$tipc(r1, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x8001, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="3820875473885ba468953b6eb95c96e7b0522e200b92d3bc0bcf9fe3104ecfa21af71379717c22a21edd100573e8778af9a7b3f48761b621c8e91afdb2ecb3ab28833f6b212b82ae0b680119d997d39dd44437b5f28a825b168733f74ae3253d07f30ca8022bfcebc9c0e0fcb489c5685a3d06f26e750fbeae1515a3d7a417728dc065b425c7adf7f4cb1c7c3139cbd304e8bbcd39a012f9707bb404", 0x9c, 0x5}, {&(0x7f0000001180)="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", 0x1000, 0x7aa6f98d}, {&(0x7f00000001c0)="cae3271343702190f2a9357fcb9dc247ad78703dd42dd805", 0x18, 0x8}], 0x2000000, &(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',audit,\x00']) [ 356.268047] FAULT_INJECTION: forcing a failure. [ 356.268047] name failslab, interval 1, probability 0, space 0, times 0 [ 356.319952] CPU: 0 PID: 19507 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 356.327110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.336590] Call Trace: [ 356.336611] dump_stack+0x138/0x197 [ 356.336630] should_fail.cold+0x10f/0x159 [ 356.336646] should_failslab+0xdb/0x130 [ 356.336657] kmem_cache_alloc_node_trace+0x280/0x770 [ 356.336670] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 356.342935] __kmalloc_node_track_caller+0x3d/0x80 15:18:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 356.342950] __kmalloc_reserve.isra.0+0x40/0xe0 [ 356.342962] __alloc_skb+0xcf/0x500 [ 356.342974] ? skb_scrub_packet+0x4b0/0x4b0 [ 356.342988] ? netlink_has_listeners+0x20a/0x330 [ 356.343003] kobject_uevent_env+0x781/0xc23 [ 356.343014] ? internal_create_group+0x49a/0x7b0 [ 356.343031] kobject_uevent+0x20/0x26 [ 356.397078] lo_ioctl+0x11e7/0x1ce0 [ 356.400719] ? loop_probe+0x160/0x160 [ 356.404524] blkdev_ioctl+0x96b/0x1860 [ 356.408423] ? blkpg_ioctl+0x980/0x980 [ 356.412324] ? __might_sleep+0x93/0xb0 [ 356.416220] ? __fget+0x210/0x370 [ 356.419849] block_ioctl+0xde/0x120 [ 356.423472] ? blkdev_fallocate+0x3b0/0x3b0 [ 356.427845] do_vfs_ioctl+0x7ae/0x1060 [ 356.431737] ? selinux_file_mprotect+0x5d0/0x5d0 [ 356.436485] ? lock_downgrade+0x6e0/0x6e0 [ 356.440622] ? ioctl_preallocate+0x1c0/0x1c0 [ 356.445020] ? __fget+0x237/0x370 [ 356.448461] ? security_file_ioctl+0x89/0xb0 [ 356.452860] SyS_ioctl+0x8f/0xc0 [ 356.456234] ? do_vfs_ioctl+0x1060/0x1060 [ 356.460384] do_syscall_64+0x1e8/0x640 [ 356.464310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.469176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.474366] RIP: 0033:0x4596e7 [ 356.477550] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 356.485310] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 356.492588] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 356.499938] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 356.507380] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 15:18:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x0, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 356.514739] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 356.529759] ntfs: (device loop4): parse_options(): Unrecognized mount option obj_type. [ 356.566390] ntfs: (device loop4): parse_options(): Unrecognized mount option . 15:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000000c0)=0xfffffffffffffe63) 15:18:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, 0x0, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:01 executing program 3 (fault-call:2 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x100, 0x12) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x7) write$uinput_user_dev(r1, &(0x7f00000005c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) write$uinput_user_dev(r1, &(0x7f0000000a40)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x45c) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000a) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 356.776940] input: syz1 as /devices/virtual/input/input5 [ 356.816755] FAULT_INJECTION: forcing a failure. [ 356.816755] name failslab, interval 1, probability 0, space 0, times 0 15:18:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 356.861252] CPU: 0 PID: 19563 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 356.868406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.877763] Call Trace: [ 356.877790] dump_stack+0x138/0x197 [ 356.877808] should_fail.cold+0x10f/0x159 [ 356.877823] should_failslab+0xdb/0x130 [ 356.877836] kmem_cache_alloc_node_trace+0x280/0x770 [ 356.877849] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 356.877865] __kmalloc_node_track_caller+0x3d/0x80 15:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 356.877877] __kmalloc_reserve.isra.0+0x40/0xe0 [ 356.877888] __alloc_skb+0xcf/0x500 [ 356.877897] ? skb_scrub_packet+0x4b0/0x4b0 [ 356.877910] ? netlink_has_listeners+0x20a/0x330 [ 356.892239] kobject_uevent_env+0x781/0xc23 [ 356.892259] kobject_uevent+0x20/0x26 [ 356.892271] lo_ioctl+0x11e7/0x1ce0 [ 356.937020] ? loop_probe+0x160/0x160 [ 356.940841] blkdev_ioctl+0x96b/0x1860 [ 356.944832] ? blkpg_ioctl+0x980/0x980 [ 356.948822] ? __might_sleep+0x93/0xb0 [ 356.952744] ? __fget+0x210/0x370 [ 356.956215] block_ioctl+0xde/0x120 15:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 356.959946] ? blkdev_fallocate+0x3b0/0x3b0 [ 356.964278] do_vfs_ioctl+0x7ae/0x1060 [ 356.968178] ? selinux_file_mprotect+0x5d0/0x5d0 [ 356.973075] ? lock_downgrade+0x6e0/0x6e0 [ 356.977324] ? ioctl_preallocate+0x1c0/0x1c0 [ 356.981829] ? __fget+0x237/0x370 [ 356.985328] ? security_file_ioctl+0x89/0xb0 [ 356.989745] SyS_ioctl+0x8f/0xc0 [ 356.993155] ? do_vfs_ioctl+0x1060/0x1060 [ 356.997311] do_syscall_64+0x1e8/0x640 [ 357.001249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.006208] entry_SYSCALL_64_after_hwframe+0x42/0xb7 15:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 357.011401] RIP: 0033:0x4596e7 [ 357.014594] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.022304] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 357.029578] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 357.036979] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 357.044346] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 357.051626] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 357.152501] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 357.154723] print_req_error: I/O error, dev loop2, sector 128 15:18:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = dup2(r0, r0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:02 executing program 2: r0 = dup(0xffffffffffffffff) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:02 executing program 3 (fault-call:2 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 357.349120] FAULT_INJECTION: forcing a failure. [ 357.349120] name failslab, interval 1, probability 0, space 0, times 0 [ 357.363067] CPU: 0 PID: 19615 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 357.370207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.379746] Call Trace: [ 357.382346] dump_stack+0x138/0x197 [ 357.385990] should_fail.cold+0x10f/0x159 [ 357.390154] should_failslab+0xdb/0x130 [ 357.394151] kmem_cache_alloc_node+0x287/0x780 [ 357.398779] __alloc_skb+0x9c/0x500 [ 357.402422] ? skb_scrub_packet+0x4b0/0x4b0 [ 357.406763] ? netlink_has_listeners+0x20a/0x330 [ 357.411639] kobject_uevent_env+0x781/0xc23 [ 357.415991] kobject_uevent+0x20/0x26 [ 357.419914] lo_ioctl+0x11e7/0x1ce0 [ 357.423556] ? loop_probe+0x160/0x160 [ 357.427368] blkdev_ioctl+0x96b/0x1860 [ 357.431355] ? blkpg_ioctl+0x980/0x980 [ 357.435255] ? __might_sleep+0x93/0xb0 [ 357.439150] ? __fget+0x210/0x370 [ 357.442614] block_ioctl+0xde/0x120 [ 357.446249] ? blkdev_fallocate+0x3b0/0x3b0 [ 357.450578] do_vfs_ioctl+0x7ae/0x1060 [ 357.454475] ? selinux_file_mprotect+0x5d0/0x5d0 [ 357.459236] ? lock_downgrade+0x6e0/0x6e0 [ 357.463429] ? ioctl_preallocate+0x1c0/0x1c0 [ 357.467850] ? __fget+0x237/0x370 [ 357.471322] ? security_file_ioctl+0x89/0xb0 [ 357.475745] SyS_ioctl+0x8f/0xc0 [ 357.479120] ? do_vfs_ioctl+0x1060/0x1060 [ 357.483274] do_syscall_64+0x1e8/0x640 [ 357.487167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.492021] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.497217] RIP: 0033:0x4596e7 [ 357.500409] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.508126] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 357.515401] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 357.522677] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 357.529963] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 357.537244] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000000)={0x800, 0x7}) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, 0x0, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:02 executing program 3 (fault-call:2 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x10000000000000de, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 357.768029] FAULT_INJECTION: forcing a failure. [ 357.768029] name failslab, interval 1, probability 0, space 0, times 0 [ 357.791130] print_req_error: I/O error, dev loop0, sector 0 [ 357.805198] print_req_error: I/O error, dev loop0, sector 1064 [ 357.813499] CPU: 0 PID: 19638 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 357.815151] print_req_error: I/O error, dev loop0, sector 2088 [ 357.820629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.820634] Call Trace: [ 357.820654] dump_stack+0x138/0x197 [ 357.820670] should_fail.cold+0x10f/0x159 [ 357.820691] should_failslab+0xdb/0x130 [ 357.820708] kmem_cache_alloc_node_trace+0x280/0x770 [ 357.835695] print_req_error: I/O error, dev loop0, sector 0 [ 357.836030] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 357.838874] Buffer I/O error on dev loop0, logical block 0, async page read [ 357.842228] __kmalloc_node_track_caller+0x3d/0x80 [ 357.842240] __kmalloc_reserve.isra.0+0x40/0xe0 [ 357.842251] __alloc_skb+0xcf/0x500 [ 357.846662] print_req_error: I/O error, dev loop0, sector 4 [ 357.850493] ? skb_scrub_packet+0x4b0/0x4b0 [ 357.850505] ? netlink_has_listeners+0x20a/0x330 [ 357.850520] kobject_uevent_env+0x781/0xc23 [ 357.850539] kobject_uevent+0x20/0x26 [ 357.855716] Buffer I/O error on dev loop0, logical block 1, async page read [ 357.861412] lo_ioctl+0x11e7/0x1ce0 [ 357.861425] ? loop_probe+0x160/0x160 [ 357.861436] blkdev_ioctl+0x96b/0x1860 [ 357.861447] ? blkpg_ioctl+0x980/0x980 [ 357.883905] ? __might_sleep+0x93/0xb0 [ 357.883914] ? __fget+0x210/0x370 [ 357.883926] block_ioctl+0xde/0x120 [ 357.883935] ? blkdev_fallocate+0x3b0/0x3b0 [ 357.883946] do_vfs_ioctl+0x7ae/0x1060 [ 357.893267] ? selinux_file_mprotect+0x5d0/0x5d0 [ 357.893279] ? lock_downgrade+0x6e0/0x6e0 [ 357.893289] ? ioctl_preallocate+0x1c0/0x1c0 [ 357.893300] ? __fget+0x237/0x370 [ 357.893316] ? security_file_ioctl+0x89/0xb0 [ 357.893328] SyS_ioctl+0x8f/0xc0 [ 357.976576] ? do_vfs_ioctl+0x1060/0x1060 [ 357.980742] do_syscall_64+0x1e8/0x640 [ 357.984618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.989451] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.994626] RIP: 0033:0x4596e7 [ 357.997820] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 358.005522] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 15:18:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$notify(r0, 0x402, 0x10) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) r2 = dup(r0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000080)={0x6, 0x0, 0x1, {0x91c1, 0x101, 0x4, 0x401}}) 15:18:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 358.012805] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 358.020068] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 358.027327] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 358.034593] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl(r0, 0x5, &(0x7f00000001c0)="110bcfe47bf07000000000") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) accept(r0, &(0x7f0000000140)=@tipc=@id, &(0x7f00000000c0)=0x80) 15:18:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, 0x0, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) finit_module(r0, &(0x7f0000000080)='selinux\x00', 0x1) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8020000}, 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)={0x1e0, r3, 0x300, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'netdevsim0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7ff, @mcast2, 0x2d}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @loopback, 0x2a}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x7}}}}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3000000000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 15:18:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0), 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:03 executing program 3 (fault-call:2 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:18:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0), 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x41100008912, &(0x7f0000000280)="11dc0008f5000700000070e43129afee16946d0b98f1288c22d69b94019e51aa85afd3f0189072d3af56687e161e744465c9a26993587db731c7407d8ac498ceff48285415c268585a8136ec03d4600e0535d885b1b44ad2cbf84eae299b32d0ffe6b38685fc0e63ba49e8c75254889f57891cdc387d2b57feedac1bace06db6e8e51363c999f8714ce6df") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 358.351349] FAULT_INJECTION: forcing a failure. [ 358.351349] name failslab, interval 1, probability 0, space 0, times 0 [ 358.379519] CPU: 0 PID: 19702 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 358.386669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.396110] Call Trace: [ 358.398700] dump_stack+0x138/0x197 [ 358.402325] should_fail.cold+0x10f/0x159 [ 358.406760] should_failslab+0xdb/0x130 [ 358.410736] kmem_cache_alloc_node_trace+0x280/0x770 [ 358.415829] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 358.421295] __kmalloc_node_track_caller+0x3d/0x80 [ 358.426237] __kmalloc_reserve.isra.0+0x40/0xe0 [ 358.430894] __alloc_skb+0xcf/0x500 [ 358.434516] ? skb_scrub_packet+0x4b0/0x4b0 [ 358.438828] ? netlink_has_listeners+0x20a/0x330 [ 358.443573] kobject_uevent_env+0x781/0xc23 [ 358.447881] kobject_uevent+0x20/0x26 [ 358.451667] lo_ioctl+0x11e7/0x1ce0 [ 358.455284] ? loop_probe+0x160/0x160 [ 358.459073] blkdev_ioctl+0x96b/0x1860 [ 358.462946] ? blkpg_ioctl+0x980/0x980 [ 358.466821] ? __might_sleep+0x93/0xb0 [ 358.470698] ? __fget+0x210/0x370 [ 358.474171] block_ioctl+0xde/0x120 [ 358.477783] ? blkdev_fallocate+0x3b0/0x3b0 [ 358.482090] do_vfs_ioctl+0x7ae/0x1060 [ 358.485967] ? selinux_file_mprotect+0x5d0/0x5d0 [ 358.490736] ? lock_downgrade+0x6e0/0x6e0 [ 358.494872] ? ioctl_preallocate+0x1c0/0x1c0 [ 358.499270] ? __fget+0x237/0x370 [ 358.502745] ? security_file_ioctl+0x89/0xb0 [ 358.507146] SyS_ioctl+0x8f/0xc0 [ 358.510505] ? do_vfs_ioctl+0x1060/0x1060 [ 358.514648] do_syscall_64+0x1e8/0x640 [ 358.518546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.523388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.528566] RIP: 0033:0x4596e7 [ 358.531736] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 358.539452] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 15:18:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:18:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x269, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80442, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000280)={0x0, @reserved}) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 358.546741] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 358.553995] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 358.561265] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 358.568527] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 358.585601] print_req_error: I/O error, dev loop1, sector 128 15:18:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RREADDIR(r0, &(0x7f0000000240)={0x141, 0x29, 0x1, {0xfffffffffffffff8, [{{0x40, 0x1, 0x4}, 0x8, 0x40, 0x7, './file0'}, {{0x41, 0x2, 0x3}, 0x4, 0x33c, 0x7, './file0'}, {{0x9, 0x2, 0x5}, 0x916a, 0x8001, 0x7, './file0'}, {{0x1edaf0ae590abed3, 0x4, 0x6}, 0x1, 0x7ff, 0x7, './file0'}, {{0x40, 0x4, 0x4}, 0x2, 0x8, 0x7, './file0'}, {{0xc0, 0x2, 0x1}, 0x6, 0x4, 0x7, './file0'}, {{0x10, 0x0, 0x5}, 0x7, 0x1, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x3}, 0x1, 0x86a, 0x7, './file0'}, {{0x81}, 0x4, 0x400, 0x7, './file0'}]}}, 0x141) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x800, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) [ 358.672092] QAT: Invalid ioctl 15:18:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0), 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 358.699488] QAT: Invalid ioctl [ 358.726914] QAT: Invalid ioctl [ 358.752173] QAT: Invalid ioctl 15:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:03 executing program 3 (fault-call:2 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:18:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x10000) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000080)={0x20, 0x5, 0x1}) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getsockname$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000280)=0x6e) 15:18:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:03 executing program 2: r0 = eventfd(0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x70003) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000b80)=""/223) dup(r0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000180)=""/72) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x6, 0xdc, 0x6, 0x4, 0xfff}) ioctl(r1, 0x7b, &(0x7f0000000380)='\x00\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x3, 0x4) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 15:18:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) [ 358.885369] FAULT_INJECTION: forcing a failure. [ 358.885369] name failslab, interval 1, probability 0, space 0, times 0 [ 358.916402] CPU: 0 PID: 19754 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 358.923578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.932938] Call Trace: 15:18:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r0, 0x5, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 358.932960] dump_stack+0x138/0x197 [ 358.932977] should_fail.cold+0x10f/0x159 [ 358.932990] should_failslab+0xdb/0x130 [ 358.933002] kmem_cache_alloc_node+0x287/0x780 [ 358.933019] __alloc_skb+0x9c/0x500 [ 358.955513] ? skb_scrub_packet+0x4b0/0x4b0 [ 358.959845] ? netlink_has_listeners+0x20a/0x330 [ 358.964770] kobject_uevent_env+0x781/0xc23 [ 358.969109] kobject_uevent+0x20/0x26 [ 358.972911] lo_ioctl+0x11e7/0x1ce0 [ 358.976546] ? loop_probe+0x160/0x160 [ 358.980354] blkdev_ioctl+0x96b/0x1860 15:18:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x9, 0x100) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xff, 0x3, 0x40}) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:18:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x37f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="714e07a73e6b2c7e96d56251a2ab0d88c1b18c31c0814c81298980d63474dc43a9db75a8bd0a6a85b0a91674ff4d5ebe48f1481a34bdc9e7128365288507e385c5d320e780ada33556c49c9d2b8c630541f09e87f59fd7493b1c5c8fec8bd104d7802ac8b7877c9f414d81f59c6f0b6dd4a3e686cf1a521ca8c89d9295522259945ffb4129ffbddcc9a9521946042f8da0f20c8be9b477c43d22c3597152296bc8d17f6a6468c8184629658fcdf7526beb31fa1bfb18e4390894104f44ca81b85c4c7e9461fdb3dd99db7b4904d73074a80b4420fafaf7f7ca962ac1591266", 0xdf, 0x2}], 0x4004, &(0x7f0000000200)='/dev/loop#\x00') ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 358.984245] ? blkpg_ioctl+0x980/0x980 [ 358.988149] ? __might_sleep+0x93/0xb0 [ 358.992041] ? __fget+0x210/0x370 [ 358.995504] block_ioctl+0xde/0x120 [ 358.999161] ? blkdev_fallocate+0x3b0/0x3b0 [ 359.003491] do_vfs_ioctl+0x7ae/0x1060 [ 359.007390] ? selinux_file_mprotect+0x5d0/0x5d0 [ 359.012155] ? lock_downgrade+0x6e0/0x6e0 [ 359.016306] ? ioctl_preallocate+0x1c0/0x1c0 [ 359.020720] ? __fget+0x237/0x370 [ 359.024184] ? security_file_ioctl+0x89/0xb0 [ 359.028618] SyS_ioctl+0x8f/0xc0 [ 359.031999] ? do_vfs_ioctl+0x1060/0x1060 [ 359.036157] do_syscall_64+0x1e8/0x640 [ 359.040049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.044919] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.044928] RIP: 0033:0x4596e7 [ 359.044932] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.053401] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 359.053407] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 359.053412] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 359.053417] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 359.053423] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 359.057718] print_req_error: I/O error, dev loop0, sector 0 [ 359.076346] print_req_error: I/O error, dev loop0, sector 1024 [ 359.090826] print_req_error: I/O error, dev loop0, sector 2048 [ 359.104279] print_req_error: I/O error, dev loop0, sector 0 [ 359.120528] Buffer I/O error on dev loop0, logical block 0, async page read [ 359.183680] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:18:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) write$binfmt_elf64(r1, &(0x7f0000001180)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x8001, 0xe4, 0x8, 0x8, 0x3, 0x3, 0x101, 0x318, 0x40, 0x3d, 0x8, 0x10001, 0x38, 0x1, 0x2, 0x112, 0x81}, [{0x2, 0x2, 0x9, 0x8, 0x8001, 0x5, 0x40, 0x6}], "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", [[], [], [], []]}, 0x1478) unshare(0x40000) sendfile(r1, r1, 0x0, 0x200000d) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000000)=0x1ff, 0x4) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000240)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) 15:18:04 executing program 3 (fault-call:2 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="2f81119050beb3c6539ad5dbe52bb404d74eab5690578eb49849e0cacded18ffc18199a200cf40a6afae3787e811100f3b3d236d2da390d441d04641f410bdddda0afb91b288b2fcb2ef76f295d10e7ed279b1afd0541acb8fa408081a6eb11b67dc6601cb1af51c6501964407382d4dc6b07b1c0530a73b2428fd574fa48ba7640e96effaa93e0cacdef93276ea938b53c9912a944c8cf158367b957ce600a4e7ff802ea1cebf77fd2c9976b9ea3a0e99f72aab5a88043fa5502fd0d53ad550f4c845542ef3be08c028369a85359a6380300ac33202c7441b24eb", 0xdb}, {&(0x7f0000000380)="567faccbc3aa33a83e044b0a3fe5067cb0306b5cd0c0fc31bdbdf8c354f167cddc2b51b1d350bbf9c124335aec31c9a92f878d400674c65fd183bc403ed93588d9729cfb8895e7e15a56ed29d37a61cb7f2b9ef747c422c5ff90d1d7c3c62ab88a48345059478393b6fdc7a3df014a0905fa8525126cb3b505572f1b76876bffbeb4712318efe2b41dee02b9532e7d56a5d98d678ffcc0cd46811d09a2e445a51aa7c6b632e61ebd0dba3e0c54b736dce2fc70a98ce1307549af42c88b0807410389205b7c6e0fa7218a5c0a475d88a4d2015fbf9dcf99fe0c738325b0cc205acfc300e72b97ac48b081988548e32a473638a1a2bd399a", 0xf7}], 0x2) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) getpriority(0x1, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 359.834714] FAULT_INJECTION: forcing a failure. [ 359.834714] name failslab, interval 1, probability 0, space 0, times 0 [ 359.849459] CPU: 0 PID: 19819 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 359.856701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.866183] Call Trace: [ 359.868892] dump_stack+0x138/0x197 [ 359.872543] should_fail.cold+0x10f/0x159 [ 359.876721] should_failslab+0xdb/0x130 15:18:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x8, 0x400000) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2c, 0x800) pwritev(r0, &(0x7f0000000540)=[{&(0x7f00000005c0)="7a80cf325ae2fb230af9e6dc1c1340ab7b7e1083e4357c97b5622b677c58f204f65bb3200395031c7aa8477068b637e384201b9656675b270a8fcb0174f62f55918bf556b455e4ea245f8aaf914e8b854d48c7f3b9bc066b3b3f6ae372fb9fb8bb21da15bfd503d10a4cc22973b12e651262cb39bf39ddc6c069e98f1a71741a6ab8044da895737b0330c75483d4aa95dd9787b6", 0x94}, {&(0x7f0000000280)="3792b7e3d9f7875fa046e82b4628cbe283f2902ed60166d8a27a4aad1ed21c0f17139e603e2e00538113e2ec4242d1d56a38f737a792aec4078e6ede56d505827eb9156034db", 0x46}, {&(0x7f0000000080)="36ecff2f9907abc97b6aef", 0xb}, {&(0x7f0000000300)="b4e943d8d939f1eff8a244b63ba6852b63c35a6b1a7694d0573a43e488fcb4be9f8185e24dac5dab94cf74c5f2a800506d2ddc4428400b7175820b7bc1fdeb399930de2be48c93a0918cb26289a1c756df0b5ee5ec9bc2f45ea2ec2c55cb9145cdf31cbb43809fe9a53e31a7f240ac58f26b869852cdee3fe218d8eff46f3aa1161640262098ca31f91cc1ed01e018766a819390b871134da16dc380372f11387b", 0xa1}, {&(0x7f00000003c0)="5d1ff46f4ca66222edd40fc2e1fe4d13736ab35f44d219c22d2c89394feba94e2a2fd048275ef2023850615e7020ff03ee801f31dcade6ad9d6cb1b126044e333cbc0543b80002e43fe8282b340ceab9b6158e77a840b854003bb581044d4ce98877478ccfa7aac57bfd45d08682b162050e4888d4f634c26d3ecd6dc88cc5629e5254d45ef3eae53792708c7c382605685e67970f7a3be997225cd6ebd4f7717bafbbc929ae6fe7e0478ce9ae0113c0", 0xb0}, {&(0x7f0000000480)="723a141e19e36afa4bcc43aa244952962b7747fa2b221ba6bed94874ebee9d629b0daf3718830e53ed046de9971c36026ad6977a035671c82ca60d71f347242ecd4e74c4085d69965059efa2af260ed86e75abfc8f81ab26418e0ca2f4061274d8597005ecd17f239b482f4715072d27b9cb7f1183a59f2729f20a0c8363ea04d41a32abb52cab018fc38382cb3daebafdf89c16d03db8de25cc91bc5280e55179bfbc31c939c3bdd3c112a4716fa6b0d4ae3af79b2df7c21521", 0xba}], 0x6, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 359.880699] kmem_cache_alloc_node_trace+0x280/0x770 [ 359.880714] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 359.880730] __kmalloc_node_track_caller+0x3d/0x80 [ 359.880743] __kmalloc_reserve.isra.0+0x40/0xe0 [ 359.880752] __alloc_skb+0xcf/0x500 [ 359.880759] ? skb_scrub_packet+0x4b0/0x4b0 [ 359.880770] ? netlink_has_listeners+0x20a/0x330 [ 359.880784] kobject_uevent_env+0x781/0xc23 [ 359.880799] kobject_uevent+0x20/0x26 [ 359.896296] lo_ioctl+0x11e7/0x1ce0 [ 359.896311] ? loop_probe+0x160/0x160 [ 359.896323] blkdev_ioctl+0x96b/0x1860 15:18:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) fcntl$setsig(r0, 0xa, 0xb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 359.896332] ? blkpg_ioctl+0x980/0x980 [ 359.896348] ? __might_sleep+0x93/0xb0 [ 359.941048] ? __fget+0x210/0x370 [ 359.944521] block_ioctl+0xde/0x120 [ 359.948157] ? blkdev_fallocate+0x3b0/0x3b0 [ 359.952511] do_vfs_ioctl+0x7ae/0x1060 [ 359.952526] ? selinux_file_mprotect+0x5d0/0x5d0 [ 359.952537] ? lock_downgrade+0x6e0/0x6e0 [ 359.952547] ? ioctl_preallocate+0x1c0/0x1c0 [ 359.952562] ? __fget+0x237/0x370 [ 359.961205] ? security_file_ioctl+0x89/0xb0 [ 359.961218] SyS_ioctl+0x8f/0xc0 [ 359.961228] ? do_vfs_ioctl+0x1060/0x1060 [ 359.961242] do_syscall_64+0x1e8/0x640 [ 359.961250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.961265] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.961272] RIP: 0033:0x4596e7 [ 359.961277] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.961286] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 359.961291] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 359.961296] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)='\x00'/11) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f00000002c0)={0x3, 0x2, {0x1, 0x3, 0x7, 0x0, 0x3ff}}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x404000, 0x0) openat$cgroup_int(r3, &(0x7f0000000280)='memory.low\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r2, &(0x7f00000001c0)=[{{r4, r5/1000+30000}, 0x1, 0x9, 0x3}, {{0x0, 0x2710}, 0x12, 0x6}], 0x30) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 359.961300] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 359.961304] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 359.989607] Buffer I/O error on dev loop0, logical block 0, async page read 15:18:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x1, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7a1a, 0x80000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={r3, 0x1}, &(0x7f0000000200)=0x8) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x40) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000140)=0x8fd) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) read$char_usb(r2, &(0x7f0000000340)=""/197, 0xfffffffffffffee6) 15:18:05 executing program 3 (fault-call:2 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x110000890e, &(0x7f0000000000)="1109001d9cd7f00000f070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) sendfile(r1, r1, 0x0, 0x200000d) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x800, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000002c0)={@vsock={0x28, 0x0, 0xffffffff, @host}, {&(0x7f00000001c0)=""/65, 0x41}, &(0x7f0000000280), 0x20}, 0xa0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 360.293728] FAULT_INJECTION: forcing a failure. [ 360.293728] name failslab, interval 1, probability 0, space 0, times 0 [ 360.358375] CPU: 1 PID: 19880 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 360.365518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.365523] Call Trace: [ 360.365545] dump_stack+0x138/0x197 [ 360.381182] should_fail.cold+0x10f/0x159 [ 360.385342] should_failslab+0xdb/0x130 [ 360.389322] kmem_cache_alloc_node+0x287/0x780 [ 360.393907] __alloc_skb+0x9c/0x500 [ 360.393918] ? skb_scrub_packet+0x4b0/0x4b0 [ 360.401861] ? netlink_has_listeners+0x20a/0x330 [ 360.406783] kobject_uevent_env+0x781/0xc23 [ 360.411201] kobject_uevent+0x20/0x26 [ 360.415001] lo_ioctl+0x11e7/0x1ce0 [ 360.418621] ? loop_probe+0x160/0x160 [ 360.422498] blkdev_ioctl+0x96b/0x1860 [ 360.426590] ? blkpg_ioctl+0x980/0x980 [ 360.430481] ? __might_sleep+0x93/0xb0 [ 360.434349] ? __fget+0x210/0x370 [ 360.437785] block_ioctl+0xde/0x120 [ 360.441396] ? blkdev_fallocate+0x3b0/0x3b0 [ 360.445809] do_vfs_ioctl+0x7ae/0x1060 [ 360.449775] ? selinux_file_mprotect+0x5d0/0x5d0 [ 360.454518] ? lock_downgrade+0x6e0/0x6e0 [ 360.458654] ? ioctl_preallocate+0x1c0/0x1c0 [ 360.463067] ? __fget+0x237/0x370 [ 360.466512] ? security_file_ioctl+0x89/0xb0 [ 360.470910] SyS_ioctl+0x8f/0xc0 [ 360.474262] ? do_vfs_ioctl+0x1060/0x1060 [ 360.478403] do_syscall_64+0x1e8/0x640 [ 360.482294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.487135] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.492320] RIP: 0033:0x4596e7 [ 360.495499] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xe, &(0x7f0000000080)=""/6, &(0x7f00000001c0)=0x6) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0xa, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd5bd9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "8101805ce1dc88f0bb0a35d8194333e5b1079d5bc87f576edc8400"}) [ 360.503199] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 360.510663] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 360.518030] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 360.525400] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 360.532662] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x802, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0x84, 0x3]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="8ffa5bc2c36ada58699848c5800afbb190bf77e590ca6273809a763bc89066efc555b71cb0d1e1bc26861ab4549e168ff09061507a07d683d708f4e43929f65c2742b156677cd6f8f3e1e87444dd657b094ebaf1771216e18051ed4e4dec02f79702945102244b7578545ec49568190bf558d6a49dd5c19e72afb8beff14cdaf49f75cbe10507bd12ae640e179408365c5ba638eb01cfc0eafc122574b667fc4c13120beb705e1797ad938c16beebf9b5f7fc94fcd750fb0f2f7341c256987170333efe0d3e1faa1806c509a211017d7a93470eac0d21918e8c7c0e602177545e45f0cd0b8735bf7da4914d3c68fd5cd61ce1cf13c01170a", 0xf8, 0x100000000003}], 0x0, 0x0) lremovexattr(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000180)=@random={'btrfs.', 'btrfs\x00'}) 15:18:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x101, 0x10a80) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffff9, 0x7, 0x2260000000000000, 0x5, 0x3ff, 0x3dac}) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r0, 0x0, 0xed) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:05 executing program 3 (fault-call:2 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400002, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 360.805885] FAULT_INJECTION: forcing a failure. [ 360.805885] name failslab, interval 1, probability 0, space 0, times 0 [ 360.858263] CPU: 1 PID: 19930 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 360.865452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.874815] Call Trace: [ 360.877420] dump_stack+0x138/0x197 [ 360.881070] should_fail.cold+0x10f/0x159 [ 360.885231] should_failslab+0xdb/0x130 [ 360.889224] kmem_cache_alloc_node_trace+0x280/0x770 [ 360.894347] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 360.899854] __kmalloc_node_track_caller+0x3d/0x80 [ 360.904792] __kmalloc_reserve.isra.0+0x40/0xe0 [ 360.904805] __alloc_skb+0xcf/0x500 [ 360.904815] ? skb_scrub_packet+0x4b0/0x4b0 [ 360.904827] ? netlink_has_listeners+0x20a/0x330 [ 360.904842] kobject_uevent_env+0x781/0xc23 [ 360.904858] kobject_uevent+0x20/0x26 [ 360.913140] lo_ioctl+0x11e7/0x1ce0 [ 360.913156] ? loop_probe+0x160/0x160 [ 360.913169] blkdev_ioctl+0x96b/0x1860 [ 360.913177] ? blkpg_ioctl+0x980/0x980 [ 360.913192] ? __might_sleep+0x93/0xb0 [ 360.950187] ? __fget+0x210/0x370 [ 360.953649] block_ioctl+0xde/0x120 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 360.957282] ? blkdev_fallocate+0x3b0/0x3b0 [ 360.961603] do_vfs_ioctl+0x7ae/0x1060 [ 360.965487] ? selinux_file_mprotect+0x5d0/0x5d0 [ 360.970239] ? lock_downgrade+0x6e0/0x6e0 [ 360.974392] ? ioctl_preallocate+0x1c0/0x1c0 [ 360.978822] ? __fget+0x237/0x370 [ 360.982389] ? security_file_ioctl+0x89/0xb0 [ 360.987066] SyS_ioctl+0x8f/0xc0 [ 360.990606] ? do_vfs_ioctl+0x1060/0x1060 [ 360.994761] do_syscall_64+0x1e8/0x640 [ 360.998947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.003802] entry_SYSCALL_64_after_hwframe+0x42/0xb7 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 361.009000] RIP: 0033:0x4596e7 [ 361.012190] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 361.020003] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 361.027271] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 361.034537] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 361.042012] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 361.049402] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 361.071018] loop_set_status: loop0 () has still dirty pages (nrpages=321) 15:18:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca10d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r0, 0x2, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:06 executing program 3 (fault-call:2 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) socket$nl_route(0x10, 0x3, 0x0) finit_module(r1, &(0x7f0000000000)='/dev/loop#\x00', 0x1) 15:18:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 361.323604] FAULT_INJECTION: forcing a failure. [ 361.323604] name failslab, interval 1, probability 0, space 0, times 0 [ 361.335951] CPU: 1 PID: 19999 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 361.343070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.343076] Call Trace: [ 361.343093] dump_stack+0x138/0x197 [ 361.343111] should_fail.cold+0x10f/0x159 [ 361.343126] should_failslab+0xdb/0x130 [ 361.366903] kmem_cache_alloc_node+0x287/0x780 15:18:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0xc0, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000280)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b430300000000000000c6bfd6ac63b02d293cbfb94a4946beba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf00", "81c7d45ce1dc72f0bb0a35d80104000000000000797db1079d5bc87f576edc84"}) [ 361.371504] __alloc_skb+0x9c/0x500 [ 361.375137] ? skb_scrub_packet+0x4b0/0x4b0 [ 361.375151] ? netlink_has_listeners+0x20a/0x330 [ 361.375167] kobject_uevent_env+0x781/0xc23 [ 361.375185] kobject_uevent+0x20/0x26 [ 361.375197] lo_ioctl+0x11e7/0x1ce0 [ 361.396220] ? loop_probe+0x160/0x160 [ 361.400037] blkdev_ioctl+0x96b/0x1860 [ 361.403939] ? blkpg_ioctl+0x980/0x980 [ 361.407880] ? __might_sleep+0x93/0xb0 [ 361.411784] ? __fget+0x210/0x370 [ 361.415275] block_ioctl+0xde/0x120 [ 361.418904] ? blkdev_fallocate+0x3b0/0x3b0 15:18:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x8, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x8, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xffffffff00000000) clock_gettime(0x0, &(0x7f0000001a40)) set_mempolicy(0x3, &(0x7f00000000c0)=0xfdfffffffffffff7, 0x3) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000000)=0x101) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r3, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 361.423238] do_vfs_ioctl+0x7ae/0x1060 [ 361.427223] ? selinux_file_mprotect+0x5d0/0x5d0 [ 361.431990] ? lock_downgrade+0x6e0/0x6e0 [ 361.436147] ? ioctl_preallocate+0x1c0/0x1c0 [ 361.440693] ? __fget+0x237/0x370 [ 361.444157] ? security_file_ioctl+0x89/0xb0 [ 361.448579] SyS_ioctl+0x8f/0xc0 [ 361.451953] ? do_vfs_ioctl+0x1060/0x1060 [ 361.456111] do_syscall_64+0x1e8/0x640 [ 361.460005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.464863] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.470077] RIP: 0033:0x4596e7 [ 361.473259] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 361.482623] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 361.489897] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 361.497168] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 361.504447] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 361.511808] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 361.520407] audit: type=1400 audit(1567437486.420:72): avc: denied { wake_alarm } for pid=20020 comm="syz-executor.4" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 15:18:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x104) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000000c0)={0x3, 0x2, [{0x8, 0x0, 0x7}, {0x2, 0x0, 0xd22}, {0x7}]}) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x82, "88275fdbbf0fb12bff6876c14989a73469f39d27444755e16e6ab34748bb2198c8009467676b902c571e8b740f4f7f82598fcc70268b046c03c6d1b7bd58ead3d2ea91559892960b1d7c3c258d74c36b8ef5e4938ab82c7a109acaef55c1ac1fbed81b9dc3f85564c1d1795382511bdc15a77fe613e65233ebc34dbe909636ef0802"}, &(0x7f0000000240)=0x8a) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x7, 0x1f, 0x8208, 0x7, 0xaf4, 0xc774, 0x9, 0x40, r2}, 0x20) 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 15:18:06 executing program 3 (fault-call:2 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) [ 361.827688] FAULT_INJECTION: forcing a failure. [ 361.827688] name failslab, interval 1, probability 0, space 0, times 0 [ 361.863021] CPU: 0 PID: 20042 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 361.870191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.879744] Call Trace: [ 361.882352] dump_stack+0x138/0x197 [ 361.886000] should_fail.cold+0x10f/0x159 [ 361.890405] should_failslab+0xdb/0x130 [ 361.894392] kmem_cache_alloc_node_trace+0x280/0x770 [ 361.899508] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 361.904980] __kmalloc_node_track_caller+0x3d/0x80 [ 361.910099] __kmalloc_reserve.isra.0+0x40/0xe0 [ 361.914773] __alloc_skb+0xcf/0x500 [ 361.918491] ? skb_scrub_packet+0x4b0/0x4b0 [ 361.922810] ? netlink_has_listeners+0x20a/0x330 15:18:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 361.927581] kobject_uevent_env+0x781/0xc23 [ 361.931921] kobject_uevent+0x20/0x26 [ 361.935729] lo_ioctl+0x11e7/0x1ce0 [ 361.939368] ? loop_probe+0x160/0x160 [ 361.943171] blkdev_ioctl+0x96b/0x1860 [ 361.943180] ? blkpg_ioctl+0x980/0x980 [ 361.943195] ? __might_sleep+0x93/0xb0 [ 361.943206] ? __fget+0x210/0x370 [ 361.943220] block_ioctl+0xde/0x120 [ 361.943228] ? blkdev_fallocate+0x3b0/0x3b0 [ 361.943237] do_vfs_ioctl+0x7ae/0x1060 [ 361.943248] ? selinux_file_mprotect+0x5d0/0x5d0 [ 361.943257] ? lock_downgrade+0x6e0/0x6e0 [ 361.943267] ? ioctl_preallocate+0x1c0/0x1c0 [ 361.943278] ? __fget+0x237/0x370 [ 361.943292] ? security_file_ioctl+0x89/0xb0 [ 361.943304] SyS_ioctl+0x8f/0xc0 [ 361.954937] ? do_vfs_ioctl+0x1060/0x1060 [ 361.954952] do_syscall_64+0x1e8/0x640 [ 361.954964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.007979] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.013167] RIP: 0033:0x4596e7 [ 362.016343] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:18:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) [ 362.024045] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 362.031319] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 362.038584] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 362.045872] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 362.053140] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) 15:18:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$setstatus(r0, 0x4, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:07 executing program 1: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(0xffffffffffffffff, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x2) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) 15:18:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) 15:18:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000280)="c0685721db3915e438fc0204e45d4205777aaafc75665ac5afffcb560abe662b44463101b8ace9e1fa1c4e3cf41e9bb30cb63f03ee962e41744cc274bf2e9d3f6971e1f5233ed3024905f4d75418433493f77ce324cd1074258586a9869213c73f91185b7275da6a779e7adde3fd07c1e1d51828d9dc8f839e1b587f7e8197aebfd86c66faaeee533db6e367ae86b1cad70ea450369cc67a8cfa8d2ee5244051f54bc6817bb0d7991064c1d0fc4b85abeea70f34337b7fdaaf5a84e2a213ddcd8302bc3412645bf80e4e253338c7cadb60da26a683b256", 0xd7}], 0x1, 0x0) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:07 executing program 3 (fault-call:2 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) [ 362.330171] loop_set_status: loop0 () has still dirty pages (nrpages=320) [ 362.367082] FAULT_INJECTION: forcing a failure. [ 362.367082] name failslab, interval 1, probability 0, space 0, times 0 [ 362.390250] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 362.400611] CPU: 0 PID: 20103 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 362.407761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.417127] Call Trace: [ 362.419733] dump_stack+0x138/0x197 [ 362.423379] should_fail.cold+0x10f/0x159 [ 362.427551] should_failslab+0xdb/0x130 [ 362.431549] kmem_cache_alloc+0x2d7/0x780 [ 362.435709] ? selinux_file_mprotect+0x5d0/0x5d0 [ 362.440720] ? lock_downgrade+0x6e0/0x6e0 [ 362.444928] ? ioctl_preallocate+0x1c0/0x1c0 [ 362.449563] getname_flags+0xcb/0x580 [ 362.453385] SyS_mkdir+0x7e/0x200 [ 362.456850] ? SyS_mkdirat+0x210/0x210 [ 362.460752] ? do_syscall_64+0x53/0x640 [ 362.464743] ? SyS_mkdirat+0x210/0x210 [ 362.468733] do_syscall_64+0x1e8/0x640 [ 362.472684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.477545] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.482746] RIP: 0033:0x458c97 15:18:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:18:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8002, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x5, 0x9, 0x0, 0x1ff}]}) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 362.485938] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 362.493747] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 362.501122] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 362.508491] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 362.515765] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 362.515771] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}}, 0x48) 15:18:07 executing program 3 (fault-call:2 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:07 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fadvise64(r0, 0x0, 0x81, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0xf70, 0x80000) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0xa4, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, 0x1}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x58, 0x18, &(0x7f00000001c0)={@flat=@weak_handle={0x77682a85, 0x1100, 0x1}, @fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x1, &(0x7f0000001180)=""/4096, 0x1000, 0x1, 0x8}}, &(0x7f0000000080)={0x0, 0x18, 0x30}}, 0x400}, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000280)={@fda={0x66646185, 0x3, 0x0, 0x3b}, @fda={0x66646185, 0x6, 0x0, 0x35}, @flat=@binder={0x73622a85, 0x0, 0x3}}, &(0x7f0000000300)={0x0, 0x20, 0x40}}}], 0x17, 0x0, &(0x7f0000000400)="de4641927dca26d6b71c2da404a638ca80c3c56744257c"}) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) fcntl$setpipe(r2, 0x407, 0x0) sendfile(r2, r2, 0x0, 0x200000d) r4 = msgget(0x0, 0x4) msgrcv(r4, &(0x7f00000004c0)={0x0, ""/230}, 0xee, 0x3, 0x2000) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 362.632657] FAULT_INJECTION: forcing a failure. [ 362.632657] name failslab, interval 1, probability 0, space 0, times 0 [ 362.675720] CPU: 0 PID: 20135 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 362.684260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.684265] Call Trace: [ 362.684284] dump_stack+0x138/0x197 [ 362.684303] should_fail.cold+0x10f/0x159 [ 362.684320] should_failslab+0xdb/0x130 [ 362.684331] kmem_cache_alloc+0x2d7/0x780 [ 362.684341] ? __d_lookup+0x3a2/0x670 [ 362.684351] ? mark_held_locks+0xb1/0x100 [ 362.684360] ? d_lookup+0xe5/0x240 [ 362.684372] __d_alloc+0x2d/0x9f0 [ 362.684386] d_alloc+0x4d/0x270 [ 362.684399] __lookup_hash+0x58/0x180 [ 362.684409] filename_create+0x16c/0x430 [ 362.684421] ? kern_path_mountpoint+0x40/0x40 [ 362.684436] SyS_mkdir+0x92/0x200 [ 362.684446] ? SyS_mkdirat+0x210/0x210 [ 362.684455] ? do_syscall_64+0x53/0x640 [ 362.684465] ? SyS_mkdirat+0x210/0x210 [ 362.684475] do_syscall_64+0x1e8/0x640 [ 362.684484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.684499] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.684507] RIP: 0033:0x458c97 [ 362.684512] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 362.684523] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 362.684531] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 362.696769] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 362.696775] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 362.696780] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:07 executing program 1: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(0xffffffffffffffff, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:07 executing program 5: 15:18:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r2) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r3, r3, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = dup2(r0, r0) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:07 executing program 3 (fault-call:2 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:08 executing program 5: 15:18:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) [ 362.989385] FAULT_INJECTION: forcing a failure. [ 362.989385] name failslab, interval 1, probability 0, space 0, times 0 [ 363.058859] CPU: 0 PID: 20169 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 363.066010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.075518] Call Trace: [ 363.078120] dump_stack+0x138/0x197 [ 363.081768] should_fail.cold+0x10f/0x159 [ 363.085942] should_failslab+0xdb/0x130 [ 363.089927] kmem_cache_alloc+0x2d7/0x780 [ 363.094081] ? __d_lookup+0x3a2/0x670 [ 363.098573] ? mark_held_locks+0xb1/0x100 [ 363.102738] ? d_lookup+0xe5/0x240 [ 363.106287] __d_alloc+0x2d/0x9f0 [ 363.109820] d_alloc+0x4d/0x270 [ 363.113104] __lookup_hash+0x58/0x180 [ 363.117089] filename_create+0x16c/0x430 [ 363.121136] ? kern_path_mountpoint+0x40/0x40 [ 363.125636] SyS_mkdir+0x92/0x200 [ 363.130035] ? SyS_mkdirat+0x210/0x210 [ 363.133908] ? do_syscall_64+0x53/0x640 [ 363.137980] ? SyS_mkdirat+0x210/0x210 [ 363.141959] do_syscall_64+0x1e8/0x640 [ 363.146004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.150840] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.156011] RIP: 0033:0x458c97 15:18:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x2, &(0x7f00000000c0)=0xffffffffffffffb7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(r1, &(0x7f0000000680), 0x111, 0x0) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:08 executing program 5: [ 363.159182] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 363.167099] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 363.174458] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 363.181710] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 363.189056] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 363.196921] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:08 executing program 5: 15:18:08 executing program 1: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(0xffffffffffffffff, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:08 executing program 3 (fault-call:2 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:08 executing program 5: 15:18:08 executing program 5: [ 363.377322] FAULT_INJECTION: forcing a failure. [ 363.377322] name failslab, interval 1, probability 0, space 0, times 0 [ 363.397149] CPU: 1 PID: 20207 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 363.404659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.414171] Call Trace: [ 363.417495] dump_stack+0x138/0x197 [ 363.421178] should_fail.cold+0x10f/0x159 [ 363.425329] should_failslab+0xdb/0x130 [ 363.429312] kmem_cache_alloc+0x2d7/0x780 [ 363.433463] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 363.439394] ? ext4_sync_fs+0x800/0x800 [ 363.443394] ext4_alloc_inode+0x1d/0x610 [ 363.447473] alloc_inode+0x64/0x180 [ 363.451100] new_inode_pseudo+0x19/0xf0 [ 363.455078] new_inode+0x1f/0x40 [ 363.458435] __ext4_new_inode+0x32c/0x4860 [ 363.462920] ? avc_has_perm+0x2df/0x4b0 [ 363.466890] ? ext4_free_inode+0x1210/0x1210 [ 363.471287] ? dquot_get_next_dqblk+0x160/0x160 [ 363.475948] ext4_mkdir+0x331/0xc20 [ 363.479566] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 363.484233] ? security_inode_mkdir+0xd0/0x110 [ 363.488837] vfs_mkdir+0x3ca/0x610 [ 363.492375] SyS_mkdir+0x1b7/0x200 [ 363.495905] ? SyS_mkdirat+0x210/0x210 [ 363.499785] ? do_syscall_64+0x53/0x640 [ 363.503754] ? SyS_mkdirat+0x210/0x210 [ 363.507629] do_syscall_64+0x1e8/0x640 [ 363.511541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.516490] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.521888] RIP: 0033:0x458c97 [ 363.525092] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 363.533232] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 363.540490] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 363.547753] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 363.555012] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 363.563563] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x2}], 0x0, 0x0) 15:18:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:udev_helper_exec_t:s0\x00', 0x28, 0x1) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) r2 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000280)={0x1c0000, 0x80000000, 0x10001, 'queue1\x00', 0x8}) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockname$netlink(r0, 0x0, &(0x7f0000000080)=0xfffffec5) 15:18:08 executing program 3 (fault-call:2 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f00000001c0)="d610eb5d1dc673463347654dd11e7b1f1b8da25a85a6a403000000000000003e44520151d9e0a382c0c05fc66e995031bbdbbf0b851008a2f7b3837aed6b7d5abf31211a991658055f269fd5dd01377e26c60a95e74b2e13f9189c520df21776d7c64618e81b8e48cf814a38787eba", 0x15a}], 0x3a, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 363.701056] audit: type=1400 audit(1567437488.780:73): avc: denied { relabelto } for pid=20226 comm="syz-executor.4" name="UDP-Lite" dev="sockfs" ino=70256 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:udev_helper_exec_t:s0 tclass=rawip_socket permissive=1 15:18:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 363.756791] print_req_error: 10 callbacks suppressed [ 363.756798] print_req_error: I/O error, dev loop2, sector 128 [ 363.824672] FAULT_INJECTION: forcing a failure. [ 363.824672] name failslab, interval 1, probability 0, space 0, times 0 [ 363.836357] CPU: 0 PID: 20242 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 363.843490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.853201] Call Trace: [ 363.855893] dump_stack+0x138/0x197 [ 363.859529] should_fail.cold+0x10f/0x159 [ 363.863700] should_failslab+0xdb/0x130 [ 363.867691] __kmalloc+0x71/0x7a0 [ 363.871253] ? mls_compute_context_len+0x3f6/0x5e0 [ 363.876195] ? context_struct_to_string+0x33a/0x630 [ 363.881228] context_struct_to_string+0x33a/0x630 [ 363.886089] ? security_load_policycaps+0x320/0x320 [ 363.891115] security_sid_to_context_core+0x18a/0x200 [ 363.891135] security_sid_to_context_force+0x2b/0x40 [ 363.891148] selinux_inode_init_security+0x493/0x700 [ 363.891161] ? selinux_inode_create+0x30/0x30 [ 363.891169] ? kfree+0x20a/0x270 [ 363.891184] security_inode_init_security+0x18d/0x360 [ 363.891195] ? ext4_init_acl+0x1f0/0x1f0 [ 363.891206] ? security_kernel_post_read_file+0xd0/0xd0 [ 363.891215] ? posix_acl_create+0xf5/0x3a0 [ 363.891228] ? ext4_set_acl+0x400/0x400 [ 363.891240] ? lock_downgrade+0x6e0/0x6e0 [ 363.901526] ext4_init_security+0x34/0x40 [ 363.901538] __ext4_new_inode+0x3385/0x4860 [ 363.901557] ? ext4_free_inode+0x1210/0x1210 [ 363.901572] ? dquot_get_next_dqblk+0x160/0x160 [ 363.901589] ext4_mkdir+0x331/0xc20 [ 363.929446] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 363.929461] ? security_inode_mkdir+0xd0/0x110 [ 363.929474] vfs_mkdir+0x3ca/0x610 [ 363.929485] SyS_mkdir+0x1b7/0x200 [ 363.946075] ? SyS_mkdirat+0x210/0x210 [ 363.983865] ? do_syscall_64+0x53/0x640 [ 363.988006] ? SyS_mkdirat+0x210/0x210 [ 363.991926] do_syscall_64+0x1e8/0x640 [ 363.995833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.000783] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.005967] RIP: 0033:0x458c97 [ 364.009146] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 364.017036] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 15:18:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:09 executing program 5: socket$l2tp(0x18, 0x1, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) unshare(0x8000400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0xff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 15:18:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000380)={@ax25={{0x3, @default}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, {&(0x7f00000001c0)=""/90, 0x5a}, &(0x7f0000000340), 0x44}, 0xa0) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000280)) [ 364.024489] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 364.031754] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 364.039033] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 364.046333] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:09 executing program 3 (fault-call:2 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84000) getsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f0000000240)=""/4096, &(0x7f0000000140)=0x1000) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x6, 0x5, 0x70, 0x8000000000006, 0x1}, &(0x7f0000000200)=0xffffffffffffff06) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000180)=r3, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 15:18:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) prctl$PR_MCE_KILL(0x21, 0x0, 0xc4f96743302d9bf7) sendfile(r1, r1, 0x0, 0x200000d) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bcsf0\x00', &(0x7f0000001180)=@ethtool_per_queue_op={0x4b, 0x2, [0x2c7c, 0x6, 0x5, 0x7fffffff, 0x100000001, 0x2, 0xff, 0x4, 0x0, 0xdc, 0xb3d4, 0x7, 0x2, 0xc24a, 0x1, 0x81, 0x7, 0x3ff, 0x100, 0x100, 0x6c3b, 0x8, 0x6, 0xfffffffffffffff7, 0x7, 0x0, 0x7, 0x0, 0x3f, 0xffffffffad896ba7, 0x100, 0x3, 0x0, 0x0, 0x100000000, 0xffffffffffffffff, 0x20, 0x8b, 0x6, 0x4, 0x1000, 0x4, 0x2020, 0x2, 0x400040000, 0x0, 0xc6, 0x1, 0x8, 0x0, 0x8, 0xfa99, 0x3, 0x80000000, 0x4, 0x81, 0x401, 0x3, 0x401, 0xfff, 0x72, 0x3ff, 0x81, 0xffffffff, 0x0, 0x7, 0x7, 0x3, 0x6, 0x4, 0x5, 0x6, 0x8001, 0x0, 0x9, 0x1, 0x7ff, 0x1, 0xe6, 0x2, 0x5, 0x9, 0x9, 0x8, 0x200, 0x3ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x6, 0x100000001, 0x5, 0xb5, 0x5, 0xd5, 0x6, 0x5, 0x1, 0x8001, 0x219a, 0x1, 0x0, 0x8000, 0x6, 0x0, 0x24, 0x3c, 0x0, 0x100000001, 0x80, 0x3, 0xffffffffffffffff, 0x80, 0x3, 0x5, 0xffffffff, 0xf9, 0x3, 0xff, 0x4, 0x4856, 0x0, 0x4, 0x1, 0xfffffffffffeffff, 0x8, 0x1, 0x3, 0x8, 0x101, 0x5c, 0x3f, 0xff, 0x100000000, 0x1000, 0x8, 0x5, 0x4, 0x6, 0x3, 0x1, 0x100000000, 0xfffffffffffffffd, 0x3, 0x4, 0x4, 0x100000001, 0x5, 0x4, 0x3f, 0x109a, 0x8, 0x3ff, 0x72b2, 0x4, 0xfffffffe00000000, 0x1, 0xfffffffffffeffff, 0x1, 0x0, 0x8, 0x2, 0x6d2, 0x0, 0x5, 0x7, 0x9, 0x4, 0x9, 0x8001, 0xfffffffffffffffc, 0x5, 0x7fff, 0x38ec, 0x2, 0x5, 0x10001, 0x9, 0x0, 0x2, 0xffffffffffffff5c, 0x6, 0x1ff, 0x0, 0x3ff, 0x90, 0x9, 0x0, 0x5, 0x1, 0xbe, 0xfffffffffffff18d, 0x8001, 0x2, 0x7, 0x6, 0x80000001, 0x2000000000000000, 0x3cfa, 0x57d, 0x1ff, 0xffffffff, 0x6, 0x2, 0x40d, 0x0, 0x800, 0x0, 0x31234913, 0x80000000, 0x100000001, 0x1b, 0xffffffff00000001, 0x6, 0x20, 0x1, 0x4040000, 0x5, 0x6c16, 0x9, 0x3, 0x9, 0x2, 0x800, 0x8000, 0x8, 0xca, 0x8, 0x6, 0x7fff, 0x20, 0x7, 0x6, 0x3, 0x0, 0x2, 0x1, 0x3, 0x2bc, 0x1, 0x1, 0x5, 0x9, 0x0, 0xf0c, 0xffffffffffffffff, 0x5, 0xffffffff, 0x3, 0x3, 0x8000, 0x6, 0x1, 0x200, 0x1, 0x7, 0x8, 0x49, 0xd4, 0xe1, 0x7, 0x528584bb, 0xffff, 0x20, 0xffff, 0x9, 0xff, 0x80000000, 0x4d8f, 0x1, 0xffffffff00000001, 0x1f, 0x3f, 0x10000, 0x100000001, 0x3, 0x1, 0x100, 0xe16, 0x2, 0x7, 0x4, 0xda8, 0x9, 0x5, 0xf6, 0x1000, 0x6, 0x3, 0x80000001, 0x78, 0x15, 0x2, 0x45c, 0x1f, 0x20, 0x2, 0x81, 0x14, 0x25f, 0x81, 0xd, 0xc0, 0xffffffffffffffff, 0x2a1, 0x6, 0x50, 0x2497, 0x2, 0x1, 0x14, 0x4, 0x0, 0x0, 0xa4d, 0x9, 0xfff, 0x80, 0x90, 0x8, 0x100000001, 0x6, 0x123, 0xffffffffffffffff, 0x13a, 0x8, 0x46, 0x40, 0x0, 0x10000, 0x5, 0x6, 0xcf, 0x8, 0x400, 0x6000000000000, 0x1, 0xdcb0, 0x10000, 0xa107, 0x6, 0x1, 0xa99, 0x1000000000000000, 0x400, 0x952c, 0x0, 0x18, 0x80000000, 0x9df, 0x3, 0x1, 0x5, 0x7, 0x4, 0x6, 0x6, 0x1, 0xcf27, 0x101, 0x43c, 0x7, 0x1, 0x8, 0xbb, 0xc49, 0x5, 0x7fff, 0x7fffffff, 0x6, 0x3, 0xfffffffffffffffc, 0x941, 0x100, 0x3, 0x200, 0x7f, 0x2, 0x3359, 0xfff, 0x5f6, 0x5, 0x2, 0x1, 0x6, 0x3, 0x400, 0x9, 0x80000001, 0x9, 0x9, 0x1, 0x3, 0x5, 0x2, 0x0, 0x101, 0x1, 0xa0000000000000, 0x3f, 0x5b, 0x81, 0x7fff, 0x101, 0x9, 0x7, 0x6, 0x2, 0x9, 0x9, 0x8001, 0x6, 0x8001, 0x2e, 0x2, 0x2, 0xffffffff00000000, 0x8, 0x72, 0x10000, 0x9, 0x2, 0x5, 0xfffffffffffffff8, 0x6, 0x0, 0xffff, 0x1, 0x0, 0x7b1, 0xfff, 0x9, 0x8, 0x69, 0x541, 0x0, 0x3, 0x7, 0x1, 0x8001, 0x8, 0x7f, 0x8, 0x7, 0x1, 0x1f, 0x40, 0x5, 0xd51c, 0x400, 0x3, 0x6ea2, 0x1f, 0x80000001, 0x5b, 0xfff, 0x8000, 0x56ca, 0x61, 0x63120cbb, 0x3, 0xa5, 0x1800000000000, 0x4de7, 0x1, 0xfffffffffffffffe, 0x1eaea637, 0x100000000, 0x4d1a, 0x6, 0x800, 0x1, 0x200, 0x1, 0x7, 0xfffffffffffffff7, 0xf155, 0x7ff, 0x32da, 0xfffffffffffeffff, 0xfffffffffffffffc, 0x9, 0xbc93, 0x1ff, 0xffffffffffff3d6e, 0x101, 0x5, 0x4, 0x10001, 0x8000, 0x800, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x401, 0x9, 0x81, 0x6, 0xa0, 0x8, 0x200, 0x1f, 0x7f91, 0x1, 0x594, 0xfff, 0x9, 0xbf9c, 0x0, 0x1, 0xa100, 0x6, 0xffffffff00000000, 0x5, 0x9, 0x2, 0x0, 0xd22e, 0xffff, 0xfffffffffffff093, 0x10000, 0xbe, 0x3, 0x5, 0x6, 0xc29, 0x4, 0x9, 0x2, 0x8, 0x100000001, 0x20, 0x5, 0x2, 0x3ff, 0x6, 0x1, 0x1000000000, 0x7ff, 0x1, 0x1, 0x454, 0x3, 0x7ff, 0xa7, 0x4, 0x10001, 0x7f, 0x3, 0x2de, 0x0, 0xf6b, 0x2, 0x0, 0x6, 0x7, 0x9, 0x1, 0x8, 0x7f, 0x4, 0xf3, 0xc, 0x1ff, 0x400, 0x3, 0x0, 0x1, 0x173, 0x14, 0x4, 0x40, 0x80000000, 0x2, 0x1, 0x9, 0xfffffffffffff000, 0x1f, 0x4, 0xffffffff, 0x438, 0x200, 0x10000, 0x40, 0x1, 0xfffffffffffffc03, 0xfc3a, 0x80000001, 0x6, 0x7, 0x8, 0x2, 0x7, 0xfffffffffffffff2, 0x4, 0x2, 0xff, 0x5, 0xfffffffffffff000, 0x6, 0x3, 0x9, 0x3, 0xcf, 0x0, 0xe6, 0xbb7f, 0x100000001, 0x2, 0x6, 0x3, 0x15, 0x6, 0xfffffffffffffffe, 0x1fbe, 0x1000, 0x400, 0x7, 0x3, 0x2e3, 0x1, 0x4, 0xfc000000, 0xc84, 0x401, 0x8, 0x7, 0x1, 0x8000, 0x40, 0x7, 0x8, 0x8, 0x4, 0x4, 0x9, 0x4, 0x19, 0x10000, 0xffffffff, 0x6, 0x401, 0x8, 0x4, 0x5, 0x98e0, 0x6, 0x8, 0x47, 0x2, 0x400, 0x2, 0xfffffffffffffffa, 0x8, 0x40, 0x20000000000000, 0x5, 0xfff, 0xab16, 0x3ff, 0x8, 0x481, 0x8000, 0x7, 0x10001, 0x0, 0x100000000, 0xffffffff, 0x1625, 0x7, 0xfffffffffffffff7, 0x1, 0x800, 0x0, 0x0, 0x9, 0xffff, 0x5, 0x0, 0x9, 0xd8d, 0x81, 0x54, 0x2, 0x4, 0xd6f, 0x8, 0xffffffff, 0x7fff, 0x0, 0xff, 0xc5c9, 0x5, 0x5, 0xfffffffffffffff9, 0x9, 0x1a, 0x7, 0xf6a, 0x7fffffff, 0x239, 0xd5c, 0x5, 0xffff, 0x7fff, 0x5, 0x8, 0x2, 0x9, 0x8, 0x5, 0xff, 0x6, 0x0, 0x101, 0x9, 0x8, 0x4, 0x811, 0x4, 0x5, 0x9, 0xde0, 0x9, 0x4, 0x7, 0x3, 0x0, 0x8, 0x6, 0x1, 0x20, 0x1ff, 0x3, 0x7f, 0x8, 0x4, 0xfffffffffffffffd, 0xfabd, 0x1, 0x2a98, 0x7fffffff, 0x80000000, 0x7, 0x100, 0xfff, 0x0, 0x3, 0x6, 0x7ff, 0x3, 0x400, 0xfffffffffffffff8, 0x80, 0xf80, 0x5, 0xa1, 0xfffffffeffffffff, 0x2, 0xfffffffffffffffc, 0x80000001, 0x1, 0x0, 0x183, 0x20, 0x3ff, 0x800, 0x8, 0xcf18, 0xcdb6, 0x9, 0xfff, 0x1, 0x3, 0x38, 0x3, 0x80, 0x3f, 0x1, 0x1460, 0x5, 0x0, 0x87, 0xaa4e, 0xb8, 0x6, 0x10ef, 0x4, 0x1, 0x3, 0x4, 0x8, 0x200, 0x1f, 0xe30e, 0x800, 0x5, 0x6, 0x5, 0xeee0, 0x7f, 0xc, 0x3, 0x2, 0x5, 0x0, 0x369, 0x3, 0x2, 0x8, 0xff, 0xec3, 0x20, 0x5, 0x7ff, 0x7, 0x13, 0x2, 0x1f, 0x4, 0x80000000, 0x3, 0x9, 0x5, 0xfff, 0xffffffffffffff01, 0x8, 0xf2, 0xacb, 0x1ff, 0x7fff, 0x54, 0x6, 0xffff, 0x7f, 0xfffffffffffffffa, 0x38, 0x1, 0x1, 0x7, 0xc4e, 0xfffffffffffeffff, 0xffffffffffffff00, 0x7, 0x4, 0x1ff, 0xfffffffffffffffe, 0x3, 0x4, 0x9, 0x200, 0x4, 0x3, 0x1000000, 0x4, 0x8, 0x8, 0x800, 0x1, 0x1f, 0x1, 0x7fffffff, 0x3, 0x8, 0x400, 0x7ff, 0x1, 0x4, 0x7, 0x4, 0xfffffffffffffffd, 0x5e1, 0x9, 0x7ff, 0x100000001, 0x5, 0x7fffffff, 0x4, 0x2, 0x4, 0xffffffff, 0x4bd, 0x10000, 0x5810, 0x9, 0x9, 0x81e, 0x1, 0xffffffffffffffff, 0x2, 0x40, 0x3f, 0x0, 0x8000, 0x7, 0x4, 0xffffffffffff0001, 0xff, 0x4, 0x2, 0xc54, 0x7, 0x6, 0x100, 0xc5b9, 0xfffffffffffffff7, 0xf75d, 0x2, 0x4, 0x8, 0x10001, 0x5f, 0x4, 0x8, 0x6, 0x0, 0xe7, 0x3, 0x85, 0x5, 0x4, 0x1, 0x1, 0x9, 0x800, 0x3a90, 0x2, 0x8, 0x100, 0x0, 0xfffffffffffffffc, 0x3, 0x1, 0x5, 0x8, 0xff, 0xaebc, 0x2, 0x9, 0x4, 0x3, 0x6, 0x4ccd, 0xb5ad, 0x762f, 0x9, 0x7, 0x7, 0x6, 0x8d, 0x800, 0x80000001, 0x7fff, 0x3, 0x101, 0x1f, 0xffffffff, 0x10000, 0x3, 0xffffffffffffff80, 0x0, 0x1, 0x6, 0x0, 0x3, 0x80000000, 0x5, 0x7f, 0x8, 0x49b1, 0xffffffff81ccc10c, 0x8, 0x8, 0x3c25c00000000, 0x2, 0x3, 0x8, 0x101, 0x7, 0x9, 0x2, 0x6, 0x100000001, 0x1d8, 0x5, 0x40, 0x6, 0x5, 0xb7, 0x9, 0x14a, 0x8, 0x6e326bce, 0xa9, 0x9, 0x7, 0x7ff, 0x80000000, 0x100000001, 0x59b, 0x2, 0x5910, 0x2, 0x0, 0x9, 0xfff, 0xfffffffffffffff8, 0x400, 0x8, 0x0, 0x5, 0x6, 0x800, 0x2, 0x1000, 0x8, 0x3, 0x2, 0x2, 0x4, 0x0, 0x3, 0x3a, 0x89c, 0xe9, 0x3, 0x400, 0x200, 0xffff, 0xf4, 0x9, 0x6, 0x5, 0x76, 0x8, 0xfffffffffffffff9, 0x7, 0x1f, 0x9, 0x1000, 0x70, 0xa2d1, 0xdc60, 0x9, 0x6, 0x40, 0x2, 0x3, 0x8, 0xc4, 0x73, 0x9, 0x2, 0x1, 0x1, 0x9, 0x8001, 0x9, 0x9c, 0x2, 0xffff, 0x61, 0x2, 0x5, 0x81, 0x17f1b98c, 0x200, 0x0, 0x3, 0x101, 0x9, 0x7, 0x8, 0x100000000, 0x4, 0x4, 0x2, 0x8, 0x67956235, 0x59, 0x35f, 0x4, 0x5, 0x7fff, 0x6, 0x5, 0x5, 0x1f, 0x5a8f6592, 0x3, 0x8001, 0xfff, 0x3, 0x9, 0x9a0, 0xb1f, 0xaa5, 0xab6, 0x4, 0x1, 0x6, 0x0, 0x1, 0x3, 0x2, 0x9, 0x1, 0x7, 0x300000000000000, 0x80000000, 0x7, 0x3, 0x46c94e22, 0x1, 0x1, 0x2, 0x8, 0x5, 0x4, 0x13, 0x9, 0x4, 0x1, 0x8, 0x3, 0x6, 0xf7ff, 0x3, 0x10000, 0x5, 0x7, 0x0, 0x5, 0xdf9, 0x4, 0xff, 0x2, 0xfffffffffffffff7, 0x7, 0xfffffffffffffff7, 0x0, 0x0, 0x1aee0, 0x1, 0x4, 0x8001, 0x5, 0xfffffffffffffff8, 0x7fffffff, 0x5ff, 0x6, 0x9, 0x498, 0x3f12, 0xfff, 0x8000000, 0x5, 0x8, 0x1, 0x0, 0x100000001, 0x1, 0x4, 0x100000000, 0x8, 0x4, 0x5, 0x8001, 0xb5f, 0x800, 0x36, 0x4, 0x273, 0x101, 0xff, 0x9, 0x4, 0x3, 0x5, 0x8, 0x81, 0x5, 0x1, 0x9, 0x3, 0x3f, 0x8, 0x1, 0x8000, 0x6, 0x2c04, 0xff, 0xffff, 0xff, 0x0, 0x29, 0x10000, 0xac, 0x2, 0x5, 0x3, 0x3, 0x3, 0x9, 0x4, 0xb9d1, 0x7ff, 0x20, 0xfffffffffffffffa, 0x10001, 0x0, 0xfff, 0x3, 0x3, 0x4, 0xb0, 0xfffffffffffffff7, 0xe97, 0x6, 0xffffffffffff8000, 0x80, 0x9, 0x401, 0x2, 0xfffffffffffffff8, 0x8, 0x1000, 0x7, 0x7, 0x9, 0xa, 0x1, 0x1, 0x7, 0x7, 0x0, 0x7fffffff, 0x1, 0x2, 0x2d, 0x2, 0x7f02, 0x1, 0x9, 0x10001, 0x2, 0x5000000000000000, 0x3, 0x1f, 0x6, 0x4, 0x3f, 0x100, 0xffff, 0x3ff, 0x2, 0x7, 0x7, 0x7ff, 0x8, 0x8001, 0x1800000000, 0x8001, 0x0, 0x1ff, 0xdd, 0x89, 0x5d5, 0xcc, 0x6b, 0x200, 0x2, 0x3, 0xf15, 0x6, 0x7, 0x2, 0x3, 0x0, 0x300000000000, 0x17, 0xffffffff, 0x2, 0x2, 0xffffffff, 0x2, 0x1, 0xfffffffffffffffe, 0x4, 0x88, 0x80000000, 0xfffffffffffffff7, 0x0, 0x400, 0x1, 0x7, 0x4, 0xff, 0x65, 0x7f, 0xffffffffffffffff, 0x3ff8, 0x9, 0x7, 0x0, 0x4, 0x7, 0xfba, 0x5b, 0x8, 0xd1, 0xfffffffffffffffd, 0x101, 0x5, 0x2, 0x5, 0x63, 0x8, 0x5, 0xff, 0x400, 0x9, 0x1000, 0x5, 0x8001, 0x14fa99b0, 0x7, 0x187600000000, 0x9, 0x3, 0x81, 0x1, 0xffffffff, 0x235c, 0x60000000000, 0x6, 0x0, 0x6, 0x0, 0xd, 0x5, 0x7ff, 0x6, 0x0, 0x0, 0x79, 0x1, 0x3, 0x80, 0x0, 0x9, 0x1, 0x5, 0xfc9a, 0x2, 0x90, 0x80, 0x5, 0x2, 0x3, 0xffffffff00000001, 0xfffffffffffffff9, 0x3, 0x7, 0x4, 0x5, 0xdd6a, 0x1000, 0x1000, 0x2, 0x6, 0x8, 0x81, 0x47, 0x4, 0xffff, 0xfff, 0x7, 0xad0, 0x0, 0x8, 0x4, 0x1, 0x40, 0x9, 0x3ff, 0x757f9170, 0x5, 0x7, 0xeaa8, 0x6, 0x1, 0x6, 0x8, 0x2, 0x8001, 0xe12, 0x9, 0x6, 0x124c, 0x1000, 0x401, 0x3, 0x2, 0x7, 0x80000001, 0x2, 0x6, 0xb5, 0xc9, 0x400, 0x100000001, 0x3ff, 0x2, 0x4c, 0x4, 0x2, 0x3f, 0x6, 0x43, 0x400, 0x5, 0x81, 0x1, 0x4, 0x2e, 0x8, 0x3, 0x3, 0x8, 0x401, 0x64, 0xf691, 0x3c31, 0xfffffffffffffff7, 0x7f, 0xfffffffffffffbff, 0x7c6, 0x1782, 0x10000, 0x7, 0x6, 0x101, 0x100, 0x0, 0x0, 0x1, 0x3, 0x100000000, 0x2, 0x7, 0x8, 0x8001, 0xd660, 0x3ff, 0x6e5b, 0xfffffffffffffff7, 0x100000001, 0x9, 0x10000, 0x7fffffff, 0x58d, 0x2, 0x93c, 0x5, 0x81, 0x20, 0x0, 0x5, 0x3, 0x1, 0x46d7, 0x9, 0xac5e, 0x9e2, 0x7, 0x80000001, 0xfffffffffffffbff, 0x8, 0x5, 0x3e00, 0x2, 0x6, 0x2, 0x3ff, 0x7, 0x7, 0x0, 0x4, 0x0, 0x0, 0x1, 0xc02, 0x3, 0x1000, 0x5, 0x5, 0xffffffff, 0x9, 0x1000, 0xffffffff80000000, 0x0, 0x1, 0xfffffffffffffffc, 0x6, 0x100000000, 0x8001, 0x7, 0x3, 0x1f, 0x56e, 0x6, 0x0, 0x1, 0xffffffffffffffe0, 0x3f, 0x4, 0xffff, 0x5, 0x1936, 0x8, 0x4, 0x9, 0x1, 0x2, 0x7f, 0x367, 0x4, 0x3, 0x7, 0x8, 0xba, 0xfff, 0x7fff, 0x3, 0xfffffffffffffffb, 0x62, 0x4c5a, 0x7000000000000000, 0xffffffff, 0x100000000, 0x2, 0xfffffffffffffe00, 0x9, 0x4a27, 0x401, 0x1, 0x74, 0x1000, 0x5, 0x1, 0x6ca, 0x0, 0x0, 0x100000001, 0x800, 0xffffffff, 0x8001, 0x0, 0x4, 0x81, 0x9, 0x6, 0x7, 0xfffffffffffffe01, 0x3f, 0x4, 0x849, 0x5, 0x41, 0x7, 0xfffffffffffffffc, 0x7, 0x3, 0x8, 0x2, 0x40, 0x101, 0x7, 0x9, 0xfffffffffffffffe, 0xf999, 0x6, 0xcac, 0x1, 0x4, 0xfffffffffffffffd, 0x3f, 0x6, 0x5, 0x4, 0x2, 0x9, 0x6, 0xccfc, 0xaae6, 0x7, 0xecf, 0xffffffff, 0x1, 0x9, 0x5, 0x816d, 0xb9, 0x7fff, 0x4, 0x100, 0x1, 0x6, 0x3, 0x7, 0x9, 0x100, 0x1e50, 0x80, 0x2b, 0x8, 0x468a, 0x2, 0x101, 0x1ff, 0x9, 0x49d, 0x1ff, 0x0, 0x3, 0x3f, 0x7f, 0x8, 0x9, 0x80000001, 0x5, 0x5, 0x8, 0x10000, 0xfffffffffffffffa, 0x6, 0x7, 0x7b, 0xfff, 0x10000, 0x4, 0x3, 0x4b58, 0x5, 0x7c, 0x5, 0x9, 0x7, 0x10001, 0xff, 0x7, 0x1ffe00000, 0x8001, 0x4, 0x5, 0x2, 0x0, 0x7fff, 0x3, 0x2, 0x4b8, 0x0, 0x401, 0x3, 0x1, 0xfffffffffffffff7, 0x5, 0x40, 0x7f, 0x4264, 0x1f, 0x8, 0x8, 0x92, 0x2, 0x4, 0x5, 0x9, 0x4, 0x400, 0x100000000, 0x1, 0x49, 0x2, 0x9e, 0x0, 0x1, 0x3, 0x4, 0x8, 0x101, 0x6, 0x23b0, 0x3, 0xf14f, 0xffffffff, 0x8, 0xffffffffffffffc0, 0x3, 0x8, 0x9, 0x9, 0xe9b6, 0x1, 0x1, 0x4, 0x7ff, 0x7a, 0x9, 0x2, 0x7, 0x100000000, 0x4, 0x3, 0x7ff, 0x7f, 0x3, 0x100000001, 0x80000001, 0x400, 0x6, 0x0, 0x3, 0xffffffffffffffff, 0x5, 0xe1, 0x4, 0x2, 0x6, 0x0, 0x3f, 0xb0, 0x6, 0xadc, 0x7f80, 0x37b, 0xffffffffffffffff, 0x6, 0x9, 0x32, 0x4, 0x81, 0x1, 0x9, 0x5, 0x3, 0x98, 0x4, 0x100000001, 0x4, 0x6, 0x9d3, 0x5, 0x7, 0x2, 0x4334, 0x6, 0x0, 0x2, 0x9, 0x6, 0x1, 0x2, 0x8, 0x7, 0x1, 0x300, 0x7, 0x3, 0x8, 0x0, 0x993a, 0x7, 0x200, 0x800, 0x3ff, 0x101, 0x401, 0x7b, 0x8001, 0xfffffffeffffffff, 0x8, 0x12e3, 0x5, 0x7, 0x1, 0x5, 0x3ff, 0x6, 0x81, 0x0, 0x12f69ed, 0x20, 0x3, 0x80000000, 0x81, 0x3, 0x9, 0x80000000, 0x400, 0x7, 0x81, 0x9, 0xc454, 0x2, 0x6, 0x1, 0x1, 0x1ff, 0x2, 0x5, 0x7fff, 0xfff, 0xc3a7, 0x65a8, 0x101, 0x6, 0x0, 0x6, 0x4, 0x800, 0x7fff, 0x7f, 0x80000000, 0x7, 0x7, 0xfffffffffffffffd, 0xfffffffffffffffe, 0x6, 0x1, 0xedd, 0x1, 0xf92, 0x9, 0x1, 0x5, 0x8000, 0x6, 0x6, 0x7fff, 0x5, 0xf941, 0x100000001, 0x5, 0x7cf34889, 0xb1e8, 0xfffffffffffffff7, 0x3, 0xffffffffffffffff, 0x200, 0x9, 0x7eaa6010, 0x3, 0x400, 0x801, 0x8, 0x2, 0x7, 0x3, 0x5, 0x10001, 0x2, 0x200, 0x101, 0x8d71, 0x8000, 0x7, 0xa07, 0x5, 0x1000, 0x7, 0x81, 0x6, 0x3, 0x1, 0x5, 0xffff, 0xfffffffffffffff7, 0x8, 0x8, 0x200, 0x81, 0x7, 0x8, 0x80000000, 0x4, 0x9, 0x100, 0x8, 0x7, 0x1000, 0x6, 0x8, 0x33, 0x4, 0x40, 0x1, 0x4, 0xa2, 0x7, 0xa5, 0xcbe, 0x3, 0x18, 0x0, 0x5, 0xffffffffc609fa33, 0x81, 0x2e, 0xfffffffffffff349, 0x5, 0x7ff, 0x4, 0x8, 0x5, 0x631, 0x6, 0x80000001, 0x7, 0x401, 0xf9, 0x0, 0xb9, 0x9, 0x156, 0x3, 0x7ff, 0x3, 0x6, 0x0, 0x8001, 0x3ff, 0x5, 0x7, 0x7ff, 0x4, 0x0, 0x1, 0xffffffffffffff86, 0xff, 0x7fff, 0x6, 0x80, 0x7, 0x1f, 0xa63, 0x8, 0x3, 0x6, 0x3f, 0x1ff, 0x541, 0x7ef3340000000000, 0x7, 0x4, 0x400, 0x0, 0x3, 0x7, 0x5, 0x80, 0x644, 0x5, 0x4, 0x70db, 0x1, 0x3, 0x3, 0x200, 0x4, 0x6, 0xabd9, 0x5, 0x7f, 0x5, 0x1, 0x10000, 0x7, 0x7, 0x8, 0x5, 0x100000001, 0xcc, 0x80000001, 0xc6, 0x76, 0x8, 0x80000001, 0x1, 0x6, 0x9, 0xfffffffffffffffa, 0xfff, 0x7fffffff, 0x0, 0x9, 0x5, 0x4, 0x69d6, 0x235, 0x3a67b0b3, 0x4, 0x7, 0x4, 0x20, 0x40, 0x3f, 0x0, 0x2, 0x101, 0x8001, 0x0, 0x5, 0x71, 0x800, 0x36d8, 0x6, 0x0, 0x80000001, 0x2, 0x6, 0x80, 0x10001, 0x0, 0x7, 0x196a215a, 0x1, 0x9, 0x3469, 0x4, 0x7, 0x9, 0x0, 0x8, 0x6, 0x3f, 0x8001, 0x6, 0x7ff, 0x9, 0x200000000, 0x6, 0x100000000, 0xfff, 0x7, 0x7fffffff, 0x9, 0x8, 0x8, 0x7f, 0xd86d, 0x9, 0x6, 0x4, 0x7fffffff, 0x8, 0x10000, 0x5, 0xff, 0x6f, 0x9, 0x8, 0x3ff, 0x0, 0x0, 0xfff, 0x3, 0x9, 0x538, 0xffff, 0x9, 0x0, 0xf0, 0x5, 0x100000000, 0x180000000, 0x7, 0x6, 0xfffffffffffffe00, 0x64bd7318, 0x0, 0x2, 0x0, 0x1ffc00000, 0x7, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x6, 0x3, 0x18000000, 0x7f, 0x5, 0x9, 0x1, 0x35597a2b, 0x5, 0x8, 0x8000000, 0x6, 0x2, 0xa573, 0xfffffffffffffffe, 0x9, 0x10000, 0x3, 0x69, 0x3, 0x9, 0xaddc, 0xfffffffffffffbbf, 0xfffffffffffffff8, 0x0, 0x2fd0, 0x2, 0x3, 0x9, 0x1, 0xfff, 0x8, 0x1f, 0x8001, 0x8000, 0x5, 0x12, 0x1, 0x1000, 0xd38a, 0xe0, 0x3, 0xfc2, 0x4, 0xfffffffffffffffb, 0xffffffff, 0x36f4, 0x9, 0x100000001, 0x4, 0x7ff, 0x7, 0x1ee5e92a, 0x8, 0x40, 0x8, 0x6, 0x100000000, 0xfffffffffffffffa, 0xe20, 0x1, 0x8001, 0x4, 0xffffffffffffffe0, 0x66ff, 0x9, 0x0, 0x7fffffff, 0x0, 0xb815, 0x5, 0xe165, 0x1, 0x9, 0xfffffffffffffffe, 0x9, 0x100000001, 0xffff, 0x1, 0x3, 0x8, 0x2aa8, 0x2, 0x2, 0x8, 0x6, 0x8, 0x8, 0x5, 0x2, 0x0, 0x100, 0x40, 0xfff, 0x706, 0x11e2, 0x7fffffff, 0x100, 0x9, 0xffff, 0x8, 0x97e, 0x7, 0x7fff, 0x0, 0x3, 0x81, 0x8001, 0xffffffffffff8000, 0x9, 0x5, 0x7, 0x101, 0x7, 0xa09, 0x1, 0x8, 0xfff, 0x7ff, 0x8, 0x6, 0x4a, 0xb514, 0xffffffff, 0x100000000, 0xa45, 0x4a25, 0x5, 0x80, 0x9, 0x80, 0x9, 0x5, 0x5, 0x8, 0x1, 0x3ff, 0x8001, 0x0, 0xfffffffffffffffc, 0x1c, 0x10000, 0x1, 0x9, 0x401, 0x30c, 0x0, 0x800, 0x1, 0x4, 0x800, 0x5, 0x0, 0x97f, 0x9, 0xfffffffffffffffb, 0x1, 0xfffffffffffffffa, 0x4, 0x2, 0x2, 0x401, 0xffffffff, 0x0, 0x9, 0x400, 0x4, 0xa1, 0x1, 0x0, 0x19, 0x9, 0x2, 0x3, 0xfd, 0x8, 0x6, 0x6, 0x10001, 0x0, 0x1f, 0xff, 0x417a, 0x80000001, 0x100000000, 0x8, 0xfffffffffffffffe, 0x800, 0x9, 0x8, 0x4, 0x3, 0x401, 0x5, 0x0, 0x5, 0x51, 0x6, 0x454b, 0x100000000, 0x100000001, 0xffffffff, 0x9, 0x6, 0x7, 0x7, 0x5, 0x9, 0x2, 0x9, 0x7, 0x80000000, 0xfff, 0x100000000, 0x4, 0x800, 0x3, 0x400, 0x4, 0x200, 0x0, 0xb0, 0x1c, 0x100000001, 0x3, 0x400, 0x4, 0x6, 0x8, 0x1, 0x6, 0x81, 0xe9, 0xbf, 0x3, 0x3, 0x1, 0x8, 0x1f, 0x3ff, 0xffffffffffffff0b, 0x3, 0x9, 0x767, 0xff, 0x5, 0x4, 0x100000001, 0x4, 0x3ff, 0xff, 0x1000, 0x5, 0xff, 0x200, 0x81, 0x3e, 0x4000000000000000, 0x3f, 0x7, 0x2, 0x5, 0x7fff, 0x20, 0x6, 0x97e, 0x5, 0x2, 0x6, 0xa4b, 0xfffffffffffff800, 0x9, 0x4, 0x4, 0x8, 0x547, 0xffffffffffff0cfa, 0xff, 0x6, 0x2, 0x6, 0x1, 0x40, 0xfff, 0xa72, 0xffffffffffff7d0e, 0x9, 0xf09, 0xffff, 0x3, 0x40, 0x6, 0x8, 0x20, 0x5, 0x6, 0xb83a, 0x4, 0x7, 0xc377, 0x76, 0x6, 0x8, 0x1, 0x1, 0xc2, 0x4, 0xfff, 0x1, 0x5, 0x5, 0x0, 0x7, 0xfffffffffffffff7, 0x7, 0xb6, 0x6, 0x200, 0x3, 0x7, 0x5, 0x100, 0x1, 0x0, 0x9, 0x0, 0x3, 0x2, 0xef0c, 0x3, 0xba, 0x1ff, 0x6, 0x6aa7ac77, 0x100, 0xffffffffcda11393, 0x5, 0x5d2, 0x9, 0x5, 0x5, 0x5, 0x4, 0x7, 0x1, 0x9, 0xff, 0x200, 0x8, 0xdbe1, 0x8, 0xfffe0000, 0x0, 0x1, 0x9, 0x80000001, 0x0, 0x5, 0xffffffff, 0x7, 0x100000000, 0x6, 0x9, 0x6, 0x9, 0x9, 0x74, 0x1, 0x5, 0x5, 0x0, 0x7, 0x5, 0x8, 0x10001, 0x10abac3d, 0x2, 0x5, 0x6, 0xe23c, 0x79c, 0x1, 0x4fa220ca, 0x40, 0x3, 0x88, 0xda97, 0x1000, 0x8001, 0xfd, 0x4, 0x6, 0x100000000, 0x5, 0x8001, 0x7, 0x40, 0x4, 0x41, 0x0, 0x5, 0x81, 0x5, 0x2, 0x2b, 0x7, 0x0, 0x8, 0x0, 0x7, 0x2, 0x80, 0x20, 0xffffffffffffd936, 0xf7, 0xffff, 0x9, 0x1f, 0x1a0d, 0x0, 0x0, 0x9, 0x4, 0x3, 0x3, 0x4, 0x1, 0x5, 0x20, 0x0, 0x4, 0x7, 0xb1, 0x6, 0x1, 0x4, 0x8, 0x101, 0x10001, 0x800, 0x101, 0xfff, 0x400, 0x7, 0x8, 0x0, 0x80000000, 0x9, 0x7, 0x2b, 0xbe, 0x6, 0x0, 0x0, 0xfff, 0x800, 0x3ff, 0x0, 0x3ff, 0xfffffffffffffffc, 0x400, 0x9, 0x7fff, 0x1, 0x3, 0x0, 0x9, 0x8000, 0x7fffffff, 0x8, 0x7, 0x7ff, 0x7fffffff, 0x8001, 0xffffffff, 0x8, 0x6, 0xfffffffeffffffff, 0x5, 0x8, 0x2, 0x0, 0x3, 0x0, 0x1, 0x200, 0x9, 0x6, 0xfffffffffffffffd, 0x6, 0xfff, 0x7, 0x9, 0x200000, 0x100000000, 0x20, 0x3ff, 0x20, 0x40, 0x2, 0x1, 0x7f, 0x5, 0x3, 0x8, 0x8, 0x200, 0xdc30, 0x1, 0x101, 0x8, 0x8, 0x5, 0x8000, 0x0, 0x345e, 0x4, 0x10001, 0x9, 0x95, 0x8, 0x8000, 0x9, 0x5de, 0x2, 0x200, 0x4, 0x8000, 0xffff, 0x7, 0x80000001, 0x1ff, 0x1, 0x4, 0x3, 0x8, 0x0, 0x9, 0xffff, 0x101, 0x7, 0x0, 0xffffffffffffffff, 0xe678, 0x9, 0x10000, 0x9, 0x40000, 0x1, 0x1, 0xfffffffffffffff8, 0xff, 0x7f, 0x3, 0x3, 0x68, 0x3, 0x5, 0x1000, 0x2, 0x9, 0x10000, 0xffffffffffffff81, 0x5, 0x6, 0x9, 0x3f, 0x644, 0x81, 0x9, 0x10001, 0x3, 0x7, 0x0, 0x8, 0x3, 0x4, 0xe7, 0x3, 0x8, 0x6, 0xfffffffffffffffb, 0x6, 0x0, 0x2, 0x100000001, 0x4, 0x3f, 0x1f, 0x400, 0x5, 0x1da3, 0x1f, 0x6, 0x8, 0x3, 0x4, 0xfffffffffffffff8, 0x0, 0x78, 0x7, 0x1e, 0x3, 0x0, 0x3, 0x6, 0x6, 0x80, 0xffffffffffff8000, 0xffffffff, 0x8, 0x6, 0x400, 0x0, 0x3, 0x7ff, 0x9, 0x75d9, 0x2, 0x6, 0x7, 0x800, 0x3, 0x8, 0x0, 0xffffffffffffff73, 0x5, 0xffffffffffffff00, 0x1, 0x5, 0x8, 0x1000, 0x3ff, 0x3, 0x7, 0x81, 0x8, 0x2, 0x48, 0x8001, 0xbb, 0xdf9, 0x7, 0x7, 0x5, 0x8, 0x2f, 0x100, 0x101, 0x1, 0x0, 0x200, 0x8, 0x8, 0x3, 0xffff, 0xfffffffffffffff8, 0x10000, 0x1, 0xd0f, 0x0, 0x8c3a, 0x4, 0x100000001, 0x9, 0x6, 0x4, 0x7, 0x7ff, 0x4, 0x3, 0x8000, 0x5, 0x8, 0x200000004000000, 0x5, 0x6, 0x3, 0x0, 0xc0000000000, 0x3, 0x80, 0x4, 0x2, 0x71, 0x800, 0x1, 0xff, 0x200, 0x8, 0x9, 0x9a, 0x1, 0x4, 0x0, 0x4, 0xffffffffffffffc3, 0x2, 0x9, 0x100000001, 0x100000001, 0x8, 0x1f, 0x0, 0x9, 0x4, 0x3, 0x9, 0x8f, 0x81, 0x3ff, 0xdbc, 0x9, 0x9, 0x636d74c0, 0x8, 0x9, 0x1, 0x4, 0x8, 0x9786, 0x5, 0xff, 0x9, 0x100000001, 0x4, 0x81, 0x2, 0x9, 0x4, 0x0, 0x1, 0x8, 0x0, 0x2, 0xff, 0x4, 0x5, 0xffffffffffffff7f, 0x5, 0x3, 0x5, 0x10000, 0x1000, 0x401, 0xffffffff80000001, 0x3ff, 0x3, 0x8, 0x0, 0x470, 0x0, 0x9, 0xfffffffffffffffa, 0x80000001, 0x401, 0x90d4, 0x7, 0x3, 0x7fff, 0x101, 0x80, 0x120, 0x6, 0x7ff, 0x7, 0x3f, 0x5, 0x1, 0x10001, 0x8000, 0x9, 0x4, 0x9, 0x8, 0x2, 0x62d, 0x8, 0x7, 0x79b, 0x3ff, 0x101, 0x1, 0x8, 0x88d, 0x4e2, 0x1f, 0x3, 0x0, 0x6, 0x9, 0x7, 0x2, 0x58e6, 0x6, 0x6e, 0x8, 0xe9d, 0x4, 0x2, 0x95, 0x196e, 0x7, 0x8, 0x4, 0x81, 0x3, 0x2, 0xffffffff, 0x3, 0x7f, 0x9, 0x7, 0x10001, 0x0, 0x5, 0x93da, 0x5, 0xc77, 0xed84, 0x3, 0x9, 0x677, 0x101, 0x4, 0x1, 0x8001, 0xffffffffffff34f4, 0x9, 0x2, 0x7aa8, 0x5c12, 0xfffffffffffffffa, 0xd3, 0x5, 0x100000000, 0xdc7, 0x400, 0x2, 0x20, 0x5c2, 0x401, 0x8, 0x8, 0x1, 0x1, 0x1, 0x3ff, 0xffffffffffffff3b, 0x101, 0x3, 0x3, 0x1, 0x10000, 0x2, 0xfffffffffffffffc, 0x5, 0x2, 0x1, 0x6, 0x80000001, 0x4, 0x9, 0x9bab, 0x1, 0x7, 0x0, 0x5, 0x8, 0x1, 0x4, 0x9, 0x7fffffff, 0x8001, 0xffffffffffff208b, 0x9, 0x10000, 0x4a40, 0x10000, 0x4, 0x10000, 0x9, 0x2, 0x7, 0x7fff, 0xd0, 0x0, 0x7d6c, 0xffff, 0x3, 0x7ff, 0x6, 0x42e, 0x5, 0x1, 0x537e, 0x81, 0x1, 0x9, 0x100000000, 0x1, 0xfffffffffffffffd, 0x9, 0x5, 0x7, 0x8001, 0x400, 0x3c7d, 0x2, 0x101, 0x3f, 0x4, 0x8001, 0x0, 0xf2, 0x1, 0x80, 0x10001, 0xe8, 0x9, 0x8001, 0x7, 0xbefc, 0x37ed, 0x400, 0xd6, 0x10001, 0x7, 0x401, 0x3c2, 0x1f, 0x8001, 0x0, 0x7, 0x40, 0x0, 0x9, 0xffff, 0xb17, 0x1, 0x7, 0xffffffff, 0x3, 0x1, 0x4, 0x1, 0x3, 0x100000001, 0x2, 0x8, 0x0, 0x4, 0x57, 0x8, 0x101, 0xfffffffffffffff9, 0xfffffffffffff5ad, 0x100000000000000, 0x7e7, 0x4, 0x7fff, 0x6d, 0x1, 0x3, 0x8, 0x3, 0x3, 0x800, 0x100000001, 0x0, 0x2, 0x5, 0x2, 0x10000, 0x1, 0x7f, 0x1, 0xe9, 0x6, 0x7c, 0x8, 0x3, 0x52ce, 0x7ff, 0x0, 0x7, 0x4d, 0x100, 0x0, 0x5b3c495c, 0x6, 0x6, 0x1, 0x4, 0x1, 0x0, 0x8, 0x2, 0x6, 0x8, 0x6, 0x1, 0xffffffff, 0xff, 0x2, 0xffffffffffffffe0, 0x4, 0x6, 0xfff, 0x10001, 0x7, 0x81, 0x3ff, 0x7e, 0x9, 0x1800, 0x4, 0x1, 0x40, 0x3, 0x580, 0x3, 0x100000001, 0x0, 0x4ec8, 0x5, 0x6ac2, 0x20, 0x20, 0x2, 0x7, 0x80000001, 0xba, 0x0, 0x7, 0x3, 0x9, 0x32, 0x1d10, 0x5, 0x20, 0x7f, 0x7, 0xb2, 0x1, 0x9, 0x100, 0x0, 0x8, 0xc7, 0x0, 0x8001, 0x4, 0xfffffffffffff66d, 0x4, 0x1, 0x81, 0x7107325b, 0xeb, 0x1, 0x21, 0x81, 0x2, 0x7, 0x2, 0x0, 0x7, 0x40, 0x1, 0x101, 0xfffffffffffff43f, 0x7, 0x8, 0x3, 0xec3f, 0xb4b, 0x18c1, 0x8, 0x9, 0xe806, 0x1, 0x4, 0x7, 0xfffffffffffffff8, 0x3, 0x983, 0x8001, 0x9, 0x8, 0x6, 0x4, 0x100, 0x4, 0x8, 0x5, 0x3, 0x8, 0x2, 0x7ff, 0x4, 0x0, 0x3, 0x5, 0x7, 0x2, 0x8, 0x7, 0x2, 0x3, 0xfffffffffffffffd, 0xfffffffffffff3f7, 0x3, 0x101, 0x8, 0x2, 0x9, 0xfffffffffffffff7, 0x6b69, 0x401, 0xe000000000000000, 0x81, 0xd8, 0x4, 0x2, 0x391, 0x6, 0x8, 0x4, 0x0, 0x2, 0x9, 0x7, 0x0, 0x2, 0xf5db, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffff0000, 0x20, 0x8, 0x9, 0x0, 0x64, 0x1, 0x0, 0x800, 0xffffffffffff6f28, 0x40, 0x1, 0x7, 0x6, 0x9, 0x87a, 0x100000001, 0x8, 0x0, 0x81, 0x7fffffff, 0x6, 0x2, 0xd6b, 0x1, 0x5, 0x8, 0x1, 0x2, 0x1, 0x5, 0x19d, 0x3f, 0x721e, 0x9, 0x4, 0x5, 0x8001, 0x7, 0x3, 0xb605, 0xf627, 0x5, 0x3, 0x6fa, 0x1, 0xffffffff, 0x96, 0x10000000000, 0x3ff, 0x6, 0x100000001, 0x4, 0x7ff, 0x2, 0x8, 0x4, 0x7, 0xec8, 0x800, 0x2d1, 0x8, 0xe57, 0xffff, 0x401, 0x7, 0x4, 0x2, 0x1000, 0x8, 0x7f8, 0xdd6e, 0x100000001, 0xff, 0x10001, 0x9, 0x5, 0x100000001, 0x5, 0xff, 0x5, 0x2, 0x2, 0x3, 0x6, 0x0, 0x25e, 0xa939, 0x1, 0x6, 0xbd8, 0xec, 0x3, 0x6, 0x1, 0x20, 0x5, 0x8, 0x9, 0x3, 0x7, 0x2, 0x0, 0x3, 0x8001, 0x2b7440000, 0x9, 0x7fffffff, 0x81, 0x7fffffff, 0x6, 0x7, 0x4, 0xfffffffffffffffc, 0x6, 0x7fffffff, 0x3, 0x800, 0x6, 0x2703, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x9, 0xfff, 0x74b, 0x5, 0x971, 0x6, 0x22, 0x1, 0x3, 0x1000, 0x1, 0x81, 0x9, 0xc4f, 0x1, 0x6000000000000000, 0x1ff, 0xff, 0x1, 0x3, 0x7, 0x8, 0x10001, 0x9, 0x6, 0x8, 0x1, 0x200, 0x4, 0x9, 0x6, 0x4, 0x0, 0x7, 0x9, 0x80, 0x7, 0x2, 0xfff, 0x8, 0x6, 0x3, 0x27, 0x7ff, 0x7, 0x8000, 0x800, 0x80, 0x6, 0x1, 0x7fffffff, 0x7, 0x9c, 0x80, 0x0, 0xfff, 0x1, 0xfffffffffffff801, 0x4, 0xc3c, 0x7ff, 0x3, 0x100000001, 0x488, 0x7, 0x3, 0xffffffffffffffff, 0x7, 0x6, 0x2, 0x5, 0xfffffffffffffffd, 0x3, 0x1, 0x100, 0x80, 0x6, 0x3ff, 0x0, 0x6, 0x0, 0x40, 0xfffffffffffffffb, 0x8, 0x1, 0x40, 0x9, 0x6, 0x0, 0x318, 0x58b3, 0x8, 0x9, 0x0, 0x4, 0x2, 0x4a0d, 0xef9e, 0x3, 0x8001, 0x40, 0xffffffffffff8001, 0x4, 0x5, 0x4, 0x101, 0x6, 0xe0, 0x5, 0x1, 0x3f, 0xff, 0xfffffffffffffff7, 0x36eb, 0x0, 0xff, 0x4, 0xfffffffffffffffd, 0x7fff, 0x54, 0x3, 0x3f, 0x3ff, 0xffff, 0xff, 0xffffffff, 0xf2d, 0x9, 0x7, 0x3ff, 0x3f, 0x10000, 0x3, 0x1813, 0x4, 0x7, 0x7, 0x81, 0x513e246d, 0x93f, 0xff, 0x3, 0x0, 0x1f, 0x66, 0x0, 0x7, 0x4, 0x2380, 0x0, 0x6, 0x2, 0x9, 0x0, 0xffffffff, 0x5, 0x729, 0x7fff80, 0x80000001, 0x9, 0x7ff, 0x100000001, 0x1f, 0x8001, 0x200, 0x63d, 0x100000001, 0x26, 0x10001, 0x2, 0x8e7, 0x0, 0x816, 0x80000000, 0xfffffffffffff2ed, 0x2e0, 0x0, 0x8, 0x4, 0xc5, 0x7ff, 0x7, 0x3, 0xcce, 0x1, 0x0, 0x7b39, 0x5e4d, 0x5, 0xffff, 0x5, 0x3, 0x1000, 0x9, 0x2, 0x1ff, 0x20, 0x81, 0x0, 0x6, 0x6, 0x20f, 0x8001, 0x6, 0xffff, 0x0, 0x4, 0x5, 0x7, 0x10001, 0x5, 0xd8, 0x3, 0x8, 0x100000000, 0x0, 0x4, 0x0, 0x4, 0x0, 0x3aa, 0x80, 0x0, 0x5, 0x5, 0x1000, 0x9, 0xfff, 0xff0, 0x800, 0x86, 0xfd4eb17, 0x3be, 0x8, 0xfffffffffffffff7, 0xb70, 0x4, 0x4, 0xfffffffffffffff8, 0x40, 0x10001, 0x0, 0xbf62, 0xd, 0x100000000, 0x200, 0xa6, 0x100000001, 0x9, 0x1f, 0x1000000000000000, 0x5, 0x80, 0x400, 0x5, 0x9, 0xfffffffffffffe01, 0x2, 0x400, 0x3, 0x1, 0x5, 0x7, 0x1f, 0xffffffff, 0x66, 0x5, 0x1f, 0x8001, 0x5, 0x7, 0x5, 0xffffffff, 0x4, 0x1, 0x200, 0x8001, 0xf15, 0x4, 0x7, 0x80000001, 0x3, 0x8, 0x8001, 0x9, 0x6, 0x8001, 0x4, 0x0, 0x7, 0x2, 0x3, 0x76611179, 0x3, 0x6, 0x1, 0xc98, 0x1, 0x100, 0x5, 0xca4, 0x1, 0x0, 0xffff, 0x4, 0x80, 0x3ff, 0x2, 0x0, 0x5, 0x4, 0x80000000, 0x1, 0x3, 0x835c, 0x6, 0x60, 0x1, 0x4, 0x80, 0x2, 0x4, 0x8, 0x4, 0x81, 0x4, 0x27, 0x2, 0x100000001, 0x3, 0x4, 0x80, 0x0, 0x8, 0x5, 0x10000, 0x400, 0xfffffffffffffbd8, 0x80, 0x5, 0x10000, 0x1, 0x8, 0x0, 0x7, 0xaf, 0x5, 0x7, 0x2, 0x3, 0x9, 0x0, 0x3, 0x6, 0xa9b, 0xc29e, 0x2, 0x8, 0x1, 0x80000001, 0x400, 0x3f, 0x2, 0x80000001, 0x11f6, 0x0, 0x6, 0xd8, 0x7, 0x1, 0x5, 0x7fff, 0x25b2, 0xffffffffffffff2a, 0x3, 0x9, 0x6, 0x1, 0x40, 0x4, 0x6345aee80000, 0x4, 0x100000000, 0x6, 0x8, 0x0, 0x1, 0x0, 0x7, 0x7, 0x8000, 0x9, 0x7, 0x100000000, 0xfffffffffffffff7, 0x100000001, 0x6, 0x0, 0x9, 0x100000000, 0x80, 0x1, 0x0, 0x5, 0x2f0d, 0x6, 0x8, 0x80000000, 0x99e, 0x1, 0x3f, 0x0, 0x6, 0xd4, 0x81, 0xd5, 0xbb000000000, 0x4, 0x9, 0x5, 0x3, 0x7fffffff, 0x1c000000, 0x8, 0x1, 0x6, 0x3, 0xf120, 0x1f, 0x0, 0xffff, 0x40, 0x8000, 0x3, 0x8, 0xffffffffffffff01, 0x9, 0x2, 0xffff, 0x0, 0x2, 0xc8, 0x100, 0x101, 0x4, 0x400, 0x9, 0x8, 0x200, 0x9c, 0x1f, 0x2, 0x101, 0xcf42, 0x7fffffff, 0x1, 0xeeb9, 0x1f, 0x5, 0x8, 0x1, 0x2, 0x7, 0x20, 0x6, 0x8, 0x4249d6c1, 0x1, 0x40, 0x0, 0x100, 0x2, 0x10000, 0x3f, 0x8, 0x8000, 0x2f, 0x100, 0x7, 0x556c, 0x9, 0x8, 0x401, 0xff, 0x3, 0x8001, 0x1, 0x7ff, 0x3f4, 0x10000, 0x8, 0x1, 0x3ff, 0x9, 0x2fd, 0xe044, 0x2, 0x5, 0x0, 0x8, 0x8, 0x4, 0x7, 0x8, 0x10000, 0x4, 0x1, 0x1, 0x6, 0x1, 0x7, 0x5bcb, 0x6, 0x1, 0x9, 0xffffffff, 0x1, 0x57, 0x2, 0x7, 0x7fff, 0x1f, 0xffffffff80000000, 0x3, 0x3, 0x200, 0xbd, 0x81, 0x1ff, 0x6e88, 0x7, 0x9, 0x3, 0x8000, 0x8, 0x1000, 0x4, 0xb7, 0x3, 0xfffffffffffffff7, 0x5, 0x5, 0xffffffffffffffff, 0x4, 0x7fffffff, 0x4, 0x80, 0x5, 0x975, 0x1, 0x8, 0xfff, 0x8, 0x7, 0x0, 0x6, 0x2, 0x0, 0xffffffffffffffa6, 0x4, 0x44, 0x5b, 0x6, 0x100, 0xfffffffffffffffe, 0x1, 0x0, 0xffffffff9cacb5d1, 0x8b, 0x9, 0x33b, 0x1ff, 0xffffffff, 0x1, 0x1, 0x0, 0x10001, 0xeaa, 0x80000001, 0xffffffff, 0x4, 0x3245c768, 0x7, 0x4, 0x1f, 0x3f, 0x8000, 0x3, 0x4e55, 0xffffffff, 0x1, 0x6, 0x800, 0x6, 0x8a, 0xe0, 0x1, 0x7, 0x1, 0x3b, 0x8, 0x800, 0x3, 0x479, 0x2, 0x7, 0x3, 0x4, 0x80000000, 0x8, 0x800000000000, 0x5, 0x8, 0x2, 0x8, 0x800, 0x1, 0x0, 0x100, 0x2, 0x10001, 0x0, 0x1, 0x5ab, 0x100, 0x22ea, 0x0, 0x7, 0x1, 0x7, 0x1f, 0x606c, 0x7, 0x0, 0x0, 0x2, 0x98, 0x80000001, 0x7, 0x6, 0xfffffffffffffffd, 0x8000, 0x100000000, 0x1f, 0x605c, 0xffffffff, 0x10000, 0xfffffffffffffffb, 0x80000001, 0x2, 0x8, 0x3, 0x9, 0xfffffffffffffff9, 0x6, 0x3, 0x2, 0x9, 0x5, 0x1000, 0x6f, 0x2a6f, 0x100000001, 0x5, 0x6, 0x10001, 0x0, 0x8, 0x1, 0x9, 0x4, 0x3, 0x29, 0x4, 0x9, 0xffffffffffffff02, 0x3b9a17a7, 0x20, 0x8001, 0x2, 0x5, 0x7, 0xb3000000, 0x1, 0x8, 0x5, 0x7, 0x0, 0x430e, 0x2, 0x6, 0x3, 0x0, 0x9, 0x1, 0x6, 0x144, 0x7ff, 0xffff, 0x1, 0x4, 0x3, 0x80, 0x3ff, 0x7, 0x4f, 0x8, 0x9, 0xffffffffffffff00, 0xfffffffffffffffa, 0x8000, 0x0, 0x0, 0x80000001, 0x89, 0x9, 0x4, 0xffffffffffffffe0, 0x7, 0x5, 0x7, 0x8001, 0x4, 0x7b2ad927, 0x22, 0xfffffffffffffffd, 0x8e, 0x7, 0x3, 0x3, 0x7, 0x8, 0xfff, 0x0, 0x4, 0x7ff, 0x80000000, 0x8000, 0xfb53, 0x0, 0x3, 0x559, 0x8, 0x26ac], "61c8d3721209e645"}}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:09 executing program 2: ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f00000002c0)={0x6, 0x9, 0xb4a, 0x3, 0x5, 0x5}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f0000000080)={0x3f, 0x8, 0x100000001, 0x1000, 0x80000, 0x5, 0x6d, 0x7}, &(0x7f00000000c0)={0x3, 0x40, 0x100000000, 0xb136, 0x5, 0x3126, 0x9, 0x3ff}, &(0x7f0000000140)={0x6, 0x7fff, 0x0, 0x9, 0x3fe0000000000, 0xda1, 0x0, 0x2955}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f00000001c0)={0x100000001}, 0x8}) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 364.377500] FAULT_INJECTION: forcing a failure. [ 364.377500] name failslab, interval 1, probability 0, space 0, times 0 [ 364.419997] CPU: 1 PID: 20280 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 364.427144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.437191] Call Trace: [ 364.437216] dump_stack+0x138/0x197 [ 364.443428] should_fail.cold+0x10f/0x159 [ 364.443441] should_failslab+0xdb/0x130 [ 364.443453] kmem_cache_alloc+0x2d7/0x780 [ 364.443462] ? __debug_object_init+0x171/0x8e0 [ 364.443472] ? ext4_alloc_inode+0x1d/0x610 [ 364.443486] selinux_inode_alloc_security+0xb6/0x2a0 [ 364.443498] security_inode_alloc+0x94/0xd0 [ 364.474893] inode_init_always+0x552/0xaf0 [ 364.479120] alloc_inode+0x81/0x180 [ 364.482735] new_inode_pseudo+0x19/0xf0 [ 364.486883] new_inode+0x1f/0x40 [ 364.490258] __ext4_new_inode+0x32c/0x4860 [ 364.494484] ? avc_has_perm+0x2df/0x4b0 [ 364.498478] ? ext4_free_inode+0x1210/0x1210 [ 364.502878] ? dquot_get_next_dqblk+0x160/0x160 [ 364.508075] ext4_mkdir+0x331/0xc20 [ 364.511695] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 364.516359] ? security_inode_mkdir+0xd0/0x110 [ 364.520932] vfs_mkdir+0x3ca/0x610 [ 364.524473] SyS_mkdir+0x1b7/0x200 [ 364.528174] ? SyS_mkdirat+0x210/0x210 [ 364.532069] ? do_syscall_64+0x53/0x640 [ 364.536054] ? SyS_mkdirat+0x210/0x210 [ 364.539935] do_syscall_64+0x1e8/0x640 [ 364.543823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.548834] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.554008] RIP: 0033:0x458c97 [ 364.557183] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 15:18:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 364.564993] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 364.572354] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 364.579721] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 364.587152] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 364.594587] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f00000001c0), 0x1344, 0x1081808) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x2710}, 0x10) sendfile(r0, r2, 0x0, 0x20000000006) 15:18:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:10 executing program 4: ioctl(0xffffffffffffffff, 0x1100008911, &(0x7f00000001c0)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000080)) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:10 executing program 3 (fault-call:2 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000000, 0x80100) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x2a, 0x3, 0x0, {0x5, 0x9, 0x0, '-cpuset-.'}}, 0x2a) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000400)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000680)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000540)=0xe8) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)=0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000900)={{}, {0x1, 0x7}, [{0x2, 0x1, r2}, {0x2, 0x1, r3}, {0x2, 0x0, r4}, {0x2, 0xb43d4993bc86bb0e, r5}, {0x2, 0x3, r6}, {0x2, 0x5, r7}, {0x2, 0x2, r8}], {0x4, 0x2}, [{0x8, 0x5, r9}, {0x8, 0x1, r10}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000980)=""/55) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 365.071723] FAULT_INJECTION: forcing a failure. [ 365.071723] name failslab, interval 1, probability 0, space 0, times 0 [ 365.083790] CPU: 1 PID: 20339 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 365.090998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.100366] Call Trace: [ 365.100388] dump_stack+0x138/0x197 [ 365.100403] should_fail.cold+0x10f/0x159 [ 365.100416] should_failslab+0xdb/0x130 [ 365.100427] __kmalloc+0x71/0x7a0 [ 365.100436] ? mls_compute_context_len+0x3f6/0x5e0 [ 365.100448] ? context_struct_to_string+0x33a/0x630 [ 365.128682] context_struct_to_string+0x33a/0x630 [ 365.128696] ? security_load_policycaps+0x320/0x320 [ 365.128712] security_sid_to_context_core+0x18a/0x200 [ 365.128725] security_sid_to_context_force+0x2b/0x40 [ 365.128737] selinux_inode_init_security+0x493/0x700 [ 365.128748] ? selinux_inode_create+0x30/0x30 [ 365.128758] ? kfree+0x20a/0x270 [ 365.162476] security_inode_init_security+0x18d/0x360 [ 365.167679] ? ext4_init_acl+0x1f0/0x1f0 15:18:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000001180)={0xe, 0x1, 0x2, 0x4, 0x1000, "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"}, 0x100c) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 365.171841] ? security_kernel_post_read_file+0xd0/0xd0 [ 365.177218] ? posix_acl_create+0xf5/0x3a0 [ 365.181491] ? ext4_set_acl+0x400/0x400 [ 365.185879] ? lock_downgrade+0x6e0/0x6e0 [ 365.190046] ext4_init_security+0x34/0x40 [ 365.194207] __ext4_new_inode+0x3385/0x4860 [ 365.198571] ? ext4_free_inode+0x1210/0x1210 [ 365.202992] ? dquot_get_next_dqblk+0x160/0x160 [ 365.207878] ext4_mkdir+0x331/0xc20 [ 365.211625] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 365.216485] ? security_inode_mkdir+0xd0/0x110 15:18:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)='\'', 0x13c}], 0x1, 0x1081805) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:10 executing program 3 (fault-call:2 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 365.221083] vfs_mkdir+0x3ca/0x610 [ 365.221094] SyS_mkdir+0x1b7/0x200 [ 365.221104] ? SyS_mkdirat+0x210/0x210 [ 365.221114] ? do_syscall_64+0x53/0x640 [ 365.221123] ? SyS_mkdirat+0x210/0x210 [ 365.221133] do_syscall_64+0x1e8/0x640 [ 365.221140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.221156] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.221164] RIP: 0033:0x458c97 [ 365.221169] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 365.221180] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 365.221184] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 365.221189] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 365.221194] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 365.221198] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 365.311306] print_req_error: I/O error, dev loop2, sector 128 [ 365.322050] print_req_error: I/O error, dev loop2, sector 128 15:18:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 365.389800] FAULT_INJECTION: forcing a failure. [ 365.389800] name failslab, interval 1, probability 0, space 0, times 0 [ 365.420150] CPU: 0 PID: 20368 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 365.427303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.436854] Call Trace: 15:18:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000140)={0xfffffff, 0x0, 0x7f, [], &(0x7f00000000c0)={0x9f0001, 0xe0000000000000, [], @value64}}) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000005c0)='tls\x00', 0x4) syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x6, &(0x7f0000000740)=[{0xfffffffffffffffd, 0x0, 0x5d}, {&(0x7f0000000240)="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", 0xff, 0x2}, {&(0x7f0000000340)="07a18b0aa65169bb7ebed074dcb2d5e82c19f1bb34a71e4dd74a7db099265f189eb259e04c7ee456eb042d859ae31cb7c15f31c6830153e6d8b8aca10e9f1f44a5330a0e1f8bfa206528a15fbd318a894bcdd6f3d0728f2fb0b5754538cc7410a0d3481aed13c2c188f0df1245ed53c3e3fa827fe88c7c20ad56fddf6dda209f090e498a6842c8df9a8d2ddd798c189ca4847aeed1b14d59df45aac670e6e5cfe11aa50765a0a9692e578449124f551e9a090d9502a3e4d623e3d9f73c6eb26edd8526fac3ab0ea1f022c8aa4062ea6429d7cadc57ee215267b9419621ad873bcf923e3af189c13196fc75fd0122bf", 0xef, 0x3}, {&(0x7f0000000440)="96d758c898cfed01b53c8bec59625b700975fc9d55d5dbaad55066ea2a36e57be3de1bd76e4dd4981a7c60fec1c759990799c8b46cd982444b3cb1e5635d04e2ba4640eed9a9eefcead5e0a255b4fe5bb1d11cad5f61cd0ec82359b98abaaf52b57320a51dd7053606d884b96c00a583ae5ba426ea53ed8bb48f35ad592919bd18b1933797095f8fbf043c1a59b9876e9572495093070f692fe1a7a25bb80905b9755fd1fa992bdd2016c4bdd3e5c405f8da19a77b376812", 0xb8, 0x1}, {&(0x7f0000000500)="abe6e312f309d1412aba4349ca76c94de7a1b0e08676205413e7b76e7f4257d918be6f8cf26f23d3b4a9e1a1e0d3dcca501d71dce4a67b86336011b46146c87a950c0e46f6e242db15eacd0387c433a43d45b8e368013dee4b438d901fd511ec1fd40e", 0x63, 0x6}, {&(0x7f0000000680)="abf5302273693e830bd610b19c5c396f89a1ac58f0c971801fa3cf81a21433bc657bf27a82eba08376a7aea04bff947806471bf61d2a3cc30592d9b2e7af9cfecfc4e5c3300c190d3431f01afa89da1e33f27674a0a8c4d085a522d7847a4ca352418f8da5a7fd1304b6c0bc32ec7b4781646de0ddbada546d2af5f1a2a72fadd514b2b17a4303251e9e00", 0x8b, 0x4}], 0x20000, &(0x7f0000000580)={[], [{@pcr={'pcr', 0x3d, 0x24}}]}) [ 365.439451] dump_stack+0x138/0x197 [ 365.443100] should_fail.cold+0x10f/0x159 [ 365.447342] should_failslab+0xdb/0x130 [ 365.451334] __kmalloc+0x2f0/0x7a0 [ 365.454890] ? ext4_find_extent+0x709/0x960 [ 365.459259] ext4_find_extent+0x709/0x960 [ 365.463607] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 365.469072] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 365.473667] ? save_trace+0x290/0x290 [ 365.477466] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 365.482473] ? __lock_is_held+0xb6/0x140 [ 365.486548] ? lock_acquire+0x16f/0x430 [ 365.490521] ? ext4_map_blocks+0x402/0x17c0 [ 365.494837] ext4_map_blocks+0xd3c/0x17c0 [ 365.498979] ? __lock_is_held+0xb6/0x140 [ 365.503034] ? check_preemption_disabled+0x3c/0x250 [ 365.508569] ? ext4_issue_zeroout+0x160/0x160 [ 365.513327] ? __brelse+0x50/0x60 [ 365.516782] ext4_getblk+0xac/0x450 [ 365.520396] ? ext4_iomap_begin+0x8a0/0x8a0 [ 365.524721] ? ext4_free_inode+0x1210/0x1210 [ 365.529116] ext4_bread+0x6e/0x1a0 [ 365.532641] ? ext4_getblk+0x450/0x450 [ 365.536515] ext4_append+0x14b/0x360 [ 365.540220] ext4_mkdir+0x531/0xc20 [ 365.543841] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 365.548515] ? security_inode_mkdir+0xd0/0x110 [ 365.553108] vfs_mkdir+0x3ca/0x610 [ 365.556660] SyS_mkdir+0x1b7/0x200 [ 365.560208] ? SyS_mkdirat+0x210/0x210 [ 365.564095] ? do_syscall_64+0x53/0x640 [ 365.568071] ? SyS_mkdirat+0x210/0x210 [ 365.571959] do_syscall_64+0x1e8/0x640 [ 365.575839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.581457] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.586634] RIP: 0033:0x458c97 [ 365.589810] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 365.597552] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 365.605007] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 365.612267] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 365.619538] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 365.626819] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000080)=""/103, 0x67) 15:18:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) write$P9_RLERRORu(r2, &(0x7f00000001c0)={0x1d, 0x7, 0x6, {{0x10, '/selinux/policy\x00'}, 0x200}}, 0x1d) 15:18:11 executing program 3 (fault-call:2 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfffffffffffffd41, 0x10000}], 0x0, 0x0) [ 366.089886] FAULT_INJECTION: forcing a failure. [ 366.089886] name failslab, interval 1, probability 0, space 0, times 0 15:18:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 366.146603] CPU: 0 PID: 20416 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 366.153845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.163402] Call Trace: [ 366.165995] dump_stack+0x138/0x197 [ 366.169721] should_fail.cold+0x10f/0x159 [ 366.173891] should_failslab+0xdb/0x130 [ 366.177979] kmem_cache_alloc+0x2d7/0x780 [ 366.182320] ? rcu_read_lock_sched_held+0x110/0x130 [ 366.187866] ? __mark_inode_dirty+0x2b7/0x1040 [ 366.192449] ext4_mb_new_blocks+0x509/0x3990 15:18:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4001, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x3) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:11 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x200) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000080)={0x7fff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 366.192461] ? ext4_find_extent+0x709/0x960 [ 366.192479] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 366.192495] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 366.192504] ? __lock_is_held+0xb6/0x140 [ 366.192517] ? lock_acquire+0x16f/0x430 [ 366.192533] ext4_map_blocks+0x881/0x17c0 [ 366.192548] ? ext4_issue_zeroout+0x160/0x160 [ 366.227667] ? __brelse+0x50/0x60 [ 366.231137] ext4_getblk+0xac/0x450 [ 366.234873] ? ext4_iomap_begin+0x8a0/0x8a0 [ 366.239290] ? ext4_free_inode+0x1210/0x1210 [ 366.243730] ext4_bread+0x6e/0x1a0 15:18:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000300)="11dca50d5e0bcfe47bf0702ed5f7f0f76b50f64aab0e7f877fc58d59f4fc0a812886c149f84466b0969602000000934c8595146c912f51b3dc3facc27e73329ba4bd227575220e2fa3ce0aad8838638a48312eaa6cb5d7c602d1f959521a551a6f474489df04fe1a9096e483") ioctl(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x8100, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000080)={0x7a, 0x8, 0x7, 0x6, 0x5, 0x81}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 366.247279] ? ext4_getblk+0x450/0x450 [ 366.251267] ext4_append+0x14b/0x360 [ 366.255105] ext4_mkdir+0x531/0xc20 [ 366.258748] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 366.263433] ? security_inode_mkdir+0xd0/0x110 [ 366.268057] vfs_mkdir+0x3ca/0x610 [ 366.271612] SyS_mkdir+0x1b7/0x200 [ 366.275262] ? SyS_mkdirat+0x210/0x210 [ 366.279183] ? do_syscall_64+0x53/0x640 [ 366.283191] ? SyS_mkdirat+0x210/0x210 [ 366.287095] do_syscall_64+0x1e8/0x640 [ 366.290985] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 366.291001] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.291009] RIP: 0033:0x458c97 [ 366.291014] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 366.291024] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 366.291028] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 366.291035] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 366.304232] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 15:18:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 366.304238] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 366.309496] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:18:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x3, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001140)='\'', 0x1}], 0x0, 0xfffffffffffffffd) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 366.400334] loop_set_status: loop0 () has still dirty pages (nrpages=1) 15:18:11 executing program 3 (fault-call:2 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000000), &(0x7f0000000080)=0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000280)=&(0x7f0000000200)) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r2, r2, 0x0, 0x200000d) ioctl$KDSETLED(r0, 0x4b32, 0x5) r3 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 366.550307] loop_set_status: loop0 () has still dirty pages (nrpages=320) [ 366.603306] FAULT_INJECTION: forcing a failure. [ 366.603306] name failslab, interval 1, probability 0, space 0, times 0 [ 366.614816] CPU: 0 PID: 20455 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 366.621924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.631282] Call Trace: [ 366.633891] dump_stack+0x138/0x197 [ 366.637538] should_fail.cold+0x10f/0x159 [ 366.641715] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 366.646658] should_failslab+0xdb/0x130 [ 366.650638] kmem_cache_alloc+0x47/0x780 [ 366.654722] ? ext4_es_can_be_merged+0x16e/0x230 [ 366.659492] __es_insert_extent+0x26c/0xe60 [ 366.663833] ext4_es_insert_extent+0x1f0/0x590 [ 366.668444] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 366.674254] ext4_map_blocks+0xab1/0x17c0 [ 366.678399] ? ext4_issue_zeroout+0x160/0x160 [ 366.682887] ? __brelse+0x50/0x60 [ 366.686332] ext4_getblk+0xac/0x450 [ 366.690035] ? ext4_iomap_begin+0x8a0/0x8a0 [ 366.694341] ? ext4_free_inode+0x1210/0x1210 [ 366.698758] ext4_bread+0x6e/0x1a0 [ 366.702301] ? ext4_getblk+0x450/0x450 [ 366.706173] ext4_append+0x14b/0x360 [ 366.709891] ext4_mkdir+0x531/0xc20 [ 366.713520] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 366.718183] ? security_inode_mkdir+0xd0/0x110 [ 366.722750] vfs_mkdir+0x3ca/0x610 [ 366.726275] SyS_mkdir+0x1b7/0x200 [ 366.729797] ? SyS_mkdirat+0x210/0x210 [ 366.733667] ? do_syscall_64+0x53/0x640 [ 366.737628] ? SyS_mkdirat+0x210/0x210 [ 366.741497] do_syscall_64+0x1e8/0x640 [ 366.745367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 366.750199] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.755375] RIP: 0033:0x458c97 [ 366.758547] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 366.766242] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 366.773501] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 366.780754] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 366.788010] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 366.795262] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 366.856237] print_req_error: I/O error, dev loop2, sector 128 [ 366.891154] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:18:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x200000) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x12, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cf070009a476d2e2c63fd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc34a23815f624081914c7ef067d66df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x524ef6c68010a57, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) tee(r0, r0, 0x80000001, 0xa) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) write$P9_RLOCK(r2, &(0x7f0000000280)={0x8, 0x35, 0x2, 0x2}, 0x8) connect$nfc_llcp(r3, &(0x7f00000001c0)={0x27, 0x0, 0x1, 0x6, 0x6, 0x2, "2b71cd3979585fcbe3b7fbe7f9808a49c5485d8af0556a7e33de46a80aa995654f84bc2714aa414215be123fec6cb62f9d4f87095571c75a7d061dd98f05e1", 0x35}, 0x60) 15:18:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x18923f6b4ed5eec3) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0xfffffffffffff801, 0x200040) tee(r0, r1, 0xfffffffffffffff9, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000140)=0x1e) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:12 executing program 3 (fault-call:2 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) [ 367.104221] FAULT_INJECTION: forcing a failure. [ 367.104221] name failslab, interval 1, probability 0, space 0, times 0 [ 367.170573] loop_set_status: loop0 () has still dirty pages (nrpages=320) [ 367.175059] CPU: 0 PID: 20491 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 367.184656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.194281] Call Trace: [ 367.196886] dump_stack+0x138/0x197 [ 367.200621] should_fail.cold+0x10f/0x159 [ 367.204962] should_failslab+0xdb/0x130 [ 367.208992] kmem_cache_alloc+0x2d7/0x780 [ 367.213154] ? rcu_read_lock_sched_held+0x110/0x130 [ 367.218181] ? __mark_inode_dirty+0x2b7/0x1040 [ 367.222923] ext4_mb_new_blocks+0x509/0x3990 [ 367.227351] ? ext4_find_extent+0x709/0x960 [ 367.231695] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 367.236308] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 367.241364] ? __lock_is_held+0xb6/0x140 [ 367.245448] ? lock_acquire+0x16f/0x430 [ 367.249617] ext4_map_blocks+0x881/0x17c0 [ 367.253962] ? ext4_issue_zeroout+0x160/0x160 [ 367.258473] ? __brelse+0x50/0x60 [ 367.261970] ext4_getblk+0xac/0x450 [ 367.265607] ? ext4_iomap_begin+0x8a0/0x8a0 [ 367.269936] ? ext4_free_inode+0x1210/0x1210 [ 367.274359] ext4_bread+0x6e/0x1a0 [ 367.278170] ? ext4_getblk+0x450/0x450 [ 367.282079] ext4_append+0x14b/0x360 [ 367.285853] ext4_mkdir+0x531/0xc20 [ 367.289491] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 367.294171] ? security_inode_mkdir+0xd0/0x110 [ 367.298770] vfs_mkdir+0x3ca/0x610 [ 367.302408] SyS_mkdir+0x1b7/0x200 [ 367.308649] ? SyS_mkdirat+0x210/0x210 [ 367.312634] ? do_syscall_64+0x53/0x640 [ 367.316617] ? SyS_mkdirat+0x210/0x210 [ 367.320511] do_syscall_64+0x1e8/0x640 [ 367.324405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.329263] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.334544] RIP: 0033:0x458c97 [ 367.337732] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 367.345443] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 367.352718] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 367.359992] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 15:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="bc619f2408d5469328bc033c36a82cb8a6022d22f652f0661d4afbf1ba92", 0x1e, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000200)={r2, 0x1000, 0x69}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'ghash-ce\x00'}}, &(0x7f0000001180)="73db865e94a8d659600050be8dbeb91da9e147d082b796c3c821bc7948f9e0de907110f0e30302b3cf869256cf5605001491b2fe179ef51afb63f14eaf4c0ecb8b46edbdaba2437c316f48e15c70c7e2cac44aa7b99404fb4e50c42fdc76c77630e894aafe915c85d864dad5cd232d80f7404313b3533973509b60ba9dbaa37ccac22154c2012284d7473b37a813bcb21736eee98b0f27c471bb127945e8130061a4ff8535fac03f65d5e7f1fbed07067a77b0dd82de0921ff60d20b7be8f7a971d4583bbb1223ba3451bcd863da1a7ba6f4547f008404667b866a4ea08352dd9fa98b5fdc8fe5c66e66a7b7022f04cf65e2077b4ac2b4df58172b3a8dce272311981ad1cd43939d0474ac8645a28734babebcf3e61eb4b93c4b5dd53a5fe4965ad84611a087e370454ee216f61f58754af8effeaf61962a07f7c9dde7a3666c55f6407efc8d4676df27a36355898b76828732b31c8c9b59b8f9128868868f8bfac5501046110b2f6d1b8a3d883b41aa2d2cd08d2b89da22cd36efca2a37a1615e3ee94ebc48b988f80dc27565defdb83bdd010ec07830c0d45f5090a96f6e39b9350f7eee6ccde28d1264356c4a85f091e1604c8b2ba3d36697d4007167495e2a6e4ec46934b1304f1e59cf8c823d98bc952d9e720054867183ba6d0b58fdf4c45f035de6ab63c1ab9e82abb837b75ddfeb3123012851c2a2db798345d9bd7cf4971314057f3a2ca94bf221fcfc980962618058ca7951093f09f3e07f036bea09ce7860d421e0a57de2c015cc8b8f6fb5163ae536a95c29036d0be5522cc7842ef0fa1c21a6b486902541c4cfa136652428eda5ba54f31ca05ccbfd95af12ff5108e5c65bf2e5fb5908b8a04721a4386c4296d3c8dcd4d3512994d237681ad21b3e1cb4902e3ca9a85f8cbe202f38b6f2113d01ecb263b5ece95b71c274a988ff289badb004f4622f1d41ad00715239fe03dcc912f3681c33524241ab34c0b6d8258c5edde8b07c38416ca2249fe7419e6e820218a3a701cbb0d9f7892fff085adee9ef9f95852ccdacbb6380c80b152ab3498e6d0e70d47cbd17c893cc381901de71661ec167b69889cd74714cdf37f3a47496f20ea0398d7c566d09f3a509deba9c3c6bee33865afbe256bb9a7e11df5d4e78e4d9885c2ce83061981e682e19417616751b6fcb90ab240e1457fc2c67356c45dfd6850d9dbc5fce93f6c547fd3ff9bae94df1f8904de210a01ce4ccbe0efccce510ab2247b7def2ff2cb8fe11b253365aab4d1a2233408bf18fde64ca0a3dcb16265944a1723c7361879b8ead338f398e332843dd8f4db1fb4deb2b1031dcb73a4b5ead5b42a6a93490fc4cfe4e1422da1e23d638bd90cb7cecdeeee2a9b3b7e8b70a7eb2270b96dac600467f88bc3e4ad22b9f0f8d253fd586e83be65cecaa68d0555a8c1e3d64d3ef02c44a3a3237fb3bf1fee7e1f2841319bcc9fa622bfd92c195ce4e6d8a3fdcbaaa0aa64269decaa43fef58e74be3f0478c629e0c590e3dbf74a5091568eeafb98f4371e2bb3423489b33faae93e998507c471a4a64773ec6de11a70a2f6ae7d2d3f1c37a4972c419022f5890dd5bcb2bff27a97e98c4343b573102832d62140b07ed9b376fd1edc6b6290407ccaa7d8e9b6d154b9889dfb7d550882e1993b8b9140c55c5275f72cbadea69e3360c1498ecc0b79bd9498e814fc99fa88de2600d4d3d34f6f838a92047b7b613e2edcad8c8698f9422dcffaef27400cd8fc73396bffa2cfe5d44e62461b3dd3ee52cc6137df357bd89a9f1ae8818896affe7b37e0fe763810a9daf5d328577cdcb3ed6252800c82703442b6457245029229db8d4cf95ef86c108e5433ecd0fba0faedec4fb49782844828172a50ba032ded512f04fe64088fcf9a3c3ec4252c479e9b6bacebaf6ba702843941c17f1117727b5d0697d268cb18239a67d769a747fa0b7c709c79538113c80645390abaffee64f7034dee245bb03b267c1b12ce5dae9fd931de64be9af54aa7622e211346865c9e6bdb4ae8b620da54e8366fcad3d2deab5e57c42c10b0635f8d84ba6c9b2c902dae0ea00b055c2977f7ae01682b92dff45d90c4b30c2dd4855428e6e9406e11a82d7da1ce2cb7d874cc814a84158815712fb89056aca736b3f6902251ab147b361a12a26e6f617dc19f165a7d61bfa359eaa1f19403944e90d0a8ec71d7600ced272264fdd4add624e3a8fe1e0f49f8a97c2b13ea23ea9c0f0c1f0f41b51ea75de0a7bd235678f54ad11b499c571b35bfb2b36432d3364c9f91d78608f294cd8b87f19f428f26b64349203f9e4968b40719964df51894344ce75cbe425b45b5b61d1b009ff16dbe0c054ac77f792ef2ddbd2d3ea3b54f8c3270dcbc795d389a28cd68ec8061ed39c45aa1c91a51e00b6452dd8fe1303a0d4845f2a702b1725ffbea6a9f68b33cf20372731db84257df40201896998758afdeeb07c6344e5ce3906327543bb02b0a3fe7e47963b3f846fb5f0ed25b46caa345c9d5143c1d4113a6b1e504f2cc93c3e182ad3e65b26c6dfa02258c5003084992ce3910e35b97c0883dbdf151278e36530c5c0a2a90b40d9973c01bb71b9498c54c23b5c71a728354991efb09be724ce22a39f2fd94717fdf2d262385bdf593ddcc59b1f98ad25326be38fb84dcbe2c1fc7f94462ccdff7201b94740f86d1dd0bb58e22d1b824e5f100789eaa05a6e86829c8486f4d4922057ab4ad94e81974d86cbf4de56cca5df7dc2135be635f8bbaf695f90417f8a447047cd49392f6167b85d9c2e08cdd3d120c35464b0963c4752fbfa9fefcbceec09853ce107c8b43473c7d3e0d96a75ed28e0e4ce249b28f2bfa0dd623e2de26156ed7e5ef210ac27c6e08f7bffa1086a2d6a9f7887c212f9b8c399fe80efbfc620e760115a33fe341763d09c982529a0c08a22091bc2c704140cf913c763b8c1e28f2710d7f0c038a8bf3455a88a25c3b07158e486ee419655696b7cb5f3fe3b31d397597a0f52643725c9b9e121fb789f1cf9482f73bc732f426d723b93e3c4dd8afdd0f192b4efcb8a46b2bc2c9cd2e52808248bd6d06b0a4b3ac322ba0ce521c2452c294a1a5e4873909fd7de49712bd27d8041ddd6445f3b64ba4f0927a10bb406408e4afef1d828caeeb98e5742c3893cf53ba59495fabc5680c4940d456a85a3a5edf3da0bbc1edf20534b2630beba8f3bf7e3a97488203fca73c89851c0fbcb20231c5f4fff8a687335c7cf6f37e4b6857cc6acf2d1e371359a00584d980569b37c28979659e333c415a6ef7d6ccadeec442a53355c483e54c115192ca249f3ba7ea5c0b6b591703ef8969cbff457d2e3128894bfb6ef5670942cfadbb49e970c5131239e33a6ad2c51c62e6a598123c422b64e6a8e0a0b24e0a8009b9af7e2f979b40de956c050a22cb89c669fbc9f0f48d4f8e5b58c2cf0befd05330ee6e37aded462252e46a7ab6b4bf056771072e1134e183c02e7a36ae7eedb3b438d0bd9609a1bb30afb5bfd67743c92859b6c540b710bfa706d6ef6bcb90059fb0bca346359754feedde9720213f31e4cf46f44ff5c7a5da841a4d3f4e66c7edb0993ddbd8f3130407dfe959619a81613d357b1551bd80eb95f1aa9f2bf0c40b6042ef0b5de2e65506d127a026dd17911ec691949b970e99254822390e492f802a9abe6b5f95ec7fd2f2818bf3703420d87181856a7977f5793f3ae6cdbf7f2ad73b6c5f3bfaf5a9f466b55119c97284553161fcf632adb61cca42e1b108d4e52ba927ef720eb65ce5fa7a3490a49c026bd00fdbb41b922f550d41806e57a7ef5c7cc77ff090da0a5e9e1d57be4c1b6a567cb6a69206ab88f99c25d9e6a8621290f69ecf165b24f61cba0848be3677a583cd63b4d1c0d4bf6776d96904b391a1d826b5de7c060d785b7202a23588ce5810430550b33c4809a28a00c2d0ef914e09120998e1abbc2d138e17bb13d5797505989d5bb94d4906ba4374e9fbebbb4ca1a14e6fc540db136834ed4374a02cfcaf2fa699549742821a6edd60e0fb23cfeb492570d24c42c077174d66fb71451b392e5a3ca5f6de7e73df99ce15888c33ed8a73b34b5f69709bf0628763c4b2ed764f8328c9fb1803d117b05566aea2f2daf06934766fa84bf9591bad40a8dfa1831a7d7a84b5647ad0cb469b86336eb0a1a777fa37bf76fb3658ecdaea2a46ed6c8aadfff93c8c48ffb59750276bf75543c731c9b8cbf9e5f3cc51324cdd5e0a34cd38ca33fd0415a6cf0812c8c7f02723a364ff05b05630b471a994e2db1d8d6bd91b432dfa51563b2a7de28298c9bcc657f0f2a6e59f2c642d40c571e647025527234e7a657bda974a3c86a8d799b255c33e96fd648de8bc6a29fc3dc51404f366e2057084f7d1ea5790a8e38a3fedb95275ec20b9962050b19f0ea012efe306ef892b387826c6eac4568bcdb35f05a466fa332fb8fad64e5d290b6896e9b97958afd560cc4aff62469f8e8827c01330654ad11ba0502ee4f8c7d7227e3fb1b97c8504cb8508cd841b8219e670390a3c4185dd007125476d62573a0bba643722232ce263afa4f02a614faa8a69552e28c8e9e9eafee680afa516a11999e05c86b5b4380c668216a036ae124b11b289b36cacbac8fa59ea001103a8b754da6bf7338f190a97dfbb3e05f207ec8aba7a0a33491bd3f7f4aff448723c2e9e0310298cfe8309526e88c89a07376dd3f8e7f8e3f64999af6b9894af92facd208d2d8fb9780067c213e55f95d33eafcf66ec2bb9455e0b7dfd4353fd09c631a1e25030beb3392878c348ba61746fee3160e8f510787ac6f4a54a54f28f7a61473864ae41b2b37068bfb529c34724e713d38b6ab7b865163bdfb3344f8a142eb5247f42e6feaf785e327a8dc269a8d2463e1b0aeefd57511e457fd4d1728d8b3b8b6228867e2bc3eeef991707306cb287fe41c1a5d67841dd1040e08cf8a36f3d46db6dabf1a3d502f2c7986ffa7d5fcc8cbb4cffea3aa7a4b27b7fcbe3fecb1ab3459420d731602d653ab556ac89dc26157c037f2db6d8818306142ad0ec22337816f4b82342586030f4658ba8a99825e346d75b46b75ef338524519dc4404bbde2da531ae3a36adb502679cc26bc2bd47b0d0e4b87dc0ce02d866f92ac609cd5cd2c5470c73485cd4386dd1df8c6efb5eb8a821a15a1eb7a52765fb26f6463533b610285ee2e042df4c94918928520af98e27dce8b0180e417c2f53bf74ea0b18d6f24cbd38fa0e1dca0ac4e86d9e5e92ddc1c8c32f590e7e933c2cc119cbb23944fa940a25df77e520443b6d4030ea413fd922b9add4cec53df6400298f3ac4177aa617b47449cdc7287700b80db3f508730a88d0d443521e7c060371ceb8f7e4637d204b5bfa0623696f1d5da6f0424ff972a0de7a28574d2ad0c80a844405d47af305191668d71bd7753d56b45876190dfde921e313ee0e0997c3cc24378827a0c9b93532de119e898f33c2755c735919a51ec77249087c5236b4589c09d193ee4500dc315908940de68f11750b43757061e62d06b4d0cd880e00e0e1a621b7835a6b4aaac7d306dc17d2284ca4f1d3caa1661f8825bdb63fc279c4648df388947afed50823bf39101f2826f3450e7349047aac8b6f75171b7149b2a1f80aec39c74f1eba81c4738f4a08cbf4b3cab2e65630ed12a74b24a22c3a5de87694eef819bd63a069473ff013d74e9acd727ac2f62d68183244000c201943a35ffaea36e3f58055b86afbfaa3a191963299a7925253955c405204708197f6105fa664d76054", &(0x7f0000000300)=""/105) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 15:18:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 367.367293] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 367.374576] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 367.401923] loop_set_status: loop0 () has still dirty pages (nrpages=1) 15:18:12 executing program 3 (fault-call:2 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 367.630756] FAULT_INJECTION: forcing a failure. [ 367.630756] name failslab, interval 1, probability 0, space 0, times 0 [ 367.642323] CPU: 0 PID: 20535 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 367.649430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.658941] Call Trace: [ 367.661543] dump_stack+0x138/0x197 [ 367.665163] should_fail.cold+0x10f/0x159 [ 367.669321] should_failslab+0xdb/0x130 [ 367.673382] kmem_cache_alloc+0x47/0x780 [ 367.677427] ? lock_downgrade+0x6e0/0x6e0 [ 367.681561] __sigqueue_alloc+0x1da/0x400 [ 367.685706] __send_signal+0x1a2/0x1280 [ 367.690016] ? lock_acquire+0x16f/0x430 [ 367.693982] send_signal+0x49/0xc0 [ 367.697505] force_sig_info+0x243/0x350 [ 367.701471] force_sig_info_fault.constprop.0+0x1c6/0x2b0 [ 367.707031] ? is_prefetch.isra.0+0x350/0x350 [ 367.711515] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 367.717126] __bad_area_nosemaphore+0x1dc/0x2a0 [ 367.721787] bad_area+0x69/0x80 [ 367.725053] __do_page_fault+0x86f/0xb80 [ 367.729114] ? vmalloc_fault+0xe30/0xe30 [ 367.733160] ? page_fault+0x2f/0x50 [ 367.736776] do_page_fault+0x71/0x511 [ 367.740825] ? page_fault+0x2f/0x50 [ 367.744432] page_fault+0x45/0x50 [ 367.747869] RIP: 0033:0x45347f [ 367.751041] RSP: 002b:00007fa8c324fa88 EFLAGS: 00010283 [ 367.756387] RAX: 00007fa8c324fb40 RBX: 0000000020000228 RCX: 0000000000000000 [ 367.763649] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fa8c324fb40 [ 367.770897] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 367.778162] R10: 0000000000000075 R11: 00000000004e5320 R12: 0000000000000005 [ 367.785414] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) statx(r1, &(0x7f0000000180)='./file0\x00', 0x2000, 0x10, &(0x7f0000000240)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 368.001469] print_req_error: I/O error, dev loop2, sector 128 15:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getegid() 15:18:13 executing program 3 (fault-call:2 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x2, 0x0) connect$netlink(r1, &(0x7f0000000180)=@unspec, 0xc) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getegid() 15:18:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 368.277829] FAULT_INJECTION: forcing a failure. [ 368.277829] name failslab, interval 1, probability 0, space 0, times 0 15:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getegid() [ 368.375670] CPU: 0 PID: 20586 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 368.383140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.392500] Call Trace: [ 368.395104] dump_stack+0x138/0x197 [ 368.398760] should_fail.cold+0x10f/0x159 [ 368.403008] should_failslab+0xdb/0x130 [ 368.407013] __kmalloc_track_caller+0x2ec/0x790 [ 368.411695] ? strndup_user+0x62/0xf0 [ 368.415509] memdup_user+0x26/0xa0 [ 368.419054] strndup_user+0x62/0xf0 [ 368.422687] SyS_mount+0x3c/0x120 15:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 368.426153] ? copy_mnt_ns+0x8c0/0x8c0 [ 368.430143] do_syscall_64+0x1e8/0x640 [ 368.434029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.438881] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.444073] RIP: 0033:0x45c2ca [ 368.447264] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 368.454982] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 368.462349] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 368.469722] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 368.477314] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 368.484590] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:13 executing program 3 (fault-call:2 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:13 executing program 2: readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/57, 0xffffffffffffff3d) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x9, 0x7fffffff, 0x53a2, 0x1, 0x1ff, 0x5}) fcntl$getown(r0, 0x9) 15:18:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 368.667159] loop_set_status: loop0 (¤1¤͹y[ù/+oD}§¯) has still dirty pages (nrpages=320) [ 368.690122] FAULT_INJECTION: forcing a failure. [ 368.690122] name failslab, interval 1, probability 0, space 0, times 0 [ 368.748451] CPU: 0 PID: 20632 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 368.755698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.765056] Call Trace: [ 368.767662] dump_stack+0x138/0x197 [ 368.771334] should_fail.cold+0x10f/0x159 [ 368.775504] should_failslab+0xdb/0x130 [ 368.779581] __kmalloc_track_caller+0x2ec/0x790 [ 368.784268] ? strndup_user+0x62/0xf0 [ 368.788079] memdup_user+0x26/0xa0 [ 368.791628] strndup_user+0x62/0xf0 [ 368.795263] SyS_mount+0x3c/0x120 [ 368.798726] ? copy_mnt_ns+0x8c0/0x8c0 [ 368.802638] do_syscall_64+0x1e8/0x640 [ 368.806532] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.811393] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.816585] RIP: 0033:0x45c2ca [ 368.819773] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 368.827488] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 368.834774] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 368.842050] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 368.849326] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 368.856783] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:14 executing program 3 (fault-call:2 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x7c, 0x10000}], 0x0, 0x0) [ 369.324029] FAULT_INJECTION: forcing a failure. [ 369.324029] name failslab, interval 1, probability 0, space 0, times 0 [ 369.355730] CPU: 1 PID: 20685 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 369.362869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.372448] Call Trace: [ 369.375039] dump_stack+0x138/0x197 [ 369.378666] should_fail.cold+0x10f/0x159 [ 369.382893] should_failslab+0xdb/0x130 [ 369.386849] kmem_cache_alloc_trace+0x2e9/0x790 [ 369.391610] ? kasan_check_write+0x14/0x20 [ 369.395877] ? _copy_from_user+0x99/0x110 [ 369.400018] copy_mount_options+0x5c/0x2f0 [ 369.404378] SyS_mount+0x87/0x120 [ 369.407812] ? copy_mnt_ns+0x8c0/0x8c0 [ 369.411713] do_syscall_64+0x1e8/0x640 [ 369.415675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.420512] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.425702] RIP: 0033:0x45c2ca [ 369.428879] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 369.436577] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 369.443872] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 369.451189] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 369.458459] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 369.465728] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:14 executing program 3 (fault-call:2 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0b") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 369.645602] FAULT_INJECTION: forcing a failure. [ 369.645602] name failslab, interval 1, probability 0, space 0, times 0 [ 369.725957] CPU: 1 PID: 20708 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 369.733203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.742575] Call Trace: [ 369.745159] dump_stack+0x138/0x197 [ 369.748886] should_fail.cold+0x10f/0x159 [ 369.753029] should_failslab+0xdb/0x130 [ 369.756998] __kmalloc_track_caller+0x2ec/0x790 [ 369.761653] ? kasan_check_write+0x14/0x20 [ 369.765868] ? strndup_user+0x62/0xf0 [ 369.769911] memdup_user+0x26/0xa0 [ 369.773438] strndup_user+0x62/0xf0 [ 369.777049] SyS_mount+0x6b/0x120 [ 369.780482] ? copy_mnt_ns+0x8c0/0x8c0 [ 369.784358] do_syscall_64+0x1e8/0x640 [ 369.788237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.793065] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.798237] RIP: 0033:0x45c2ca [ 369.801420] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 369.809111] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 369.816364] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 15:18:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xffffffffffffff6e, 0x10000}], 0x0, 0x0) [ 369.823616] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 369.830867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 369.838116] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:15 executing program 3 (fault-call:2 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:15 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000600)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="4177bc816d19dc74a568a0bfedc95107da5258c999b58c6abf9a091b3955bad5a35d8a8a408fbf392fdc11a058f39001aa984aed62317bf601e307a5f2799dbd2f3e699c22bc771bd93d435d", 0x4c, 0x4}, {&(0x7f0000000300)="8fb2a03494de11a101620158f98da7270e429bb63a8061bade6860e8ca7048d70727d1fc911570981c929e146e37c4f05746ceb45b4489131badbf28f67bd1d607e772df2e64702a519d7150e263431a36d805d1da45cc231368bbf22b20fec5ac6bdb612be1f42a23e4281ab48da0cafe5984939a755e4040bd3c4ec4e4278b8c82ff21698121a5270505", 0x8b, 0x80000000}, {&(0x7f00000003c0)="9186da3ab59c0d91737b9195a3ead080b21ebf87f00b9415b602cbda2d5007bb458d365c6754e6e1c529d1437b5b196da476119be15bc061ddced6a49adcdaf8f4c33dd9647c1b7d9de8e306e22b7c2b4dffc1a0925a9fa83ed4dd671e34345c685eec29b062cb879779237b54c6414d7ddd2485ad50d5d7e43c079ea895f501ab66ee50915d790e7ba97133fd1e1c32ab607a533e1799c4250ab2b4329d7ab6d9b056bc1474bc288c", 0xa9, 0xfae8}], 0x4, &(0x7f00000007c0)={[{@uid={'uid', 0x3d, r2}}, {@noquota='noquota'}, {@gid={'gid', 0x3d, r3}}, {@resize='resize'}, {@quota='quota'}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x30, 0x30, 0x64, 0x3b, 0x65, 0xb27a1b10c657f1a3, 0xb0402888f23a0d85], 0x2d, [0x37, 0x38, 0x30, 0x63], 0x2d, [0x30, 0x7f, 0x7f, 0x66], 0x2d, [0x39, 0x66, 0x62, 0x33], 0x2d, [0x33, 0x73, 0x37, 0x65, 0x32, 0x35, 0x35]}}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop#\x00'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@uid_gt={'uid>', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x34, 0x39, 0x65, 0x0, 0x34, 0x33, 0x35], 0x2d, [0x37, 0x63, 0x37, 0x66], 0x2d, [0x38, 0x31, 0x33, 0x35], 0x2d, [0x31, 0x31, 0x64, 0x36], 0x2d, [0x31, 0x63, 0x31, 0x0, 0x35, 0x61, 0x34]}}}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}]}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4040, 0x0) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000940)='trusted.overlay.nlink\x00', &(0x7f0000000980)={'L+', 0x8001}, 0x28, 0x2) accept4$vsock_stream(r5, &(0x7f0000000080)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x800) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r6 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r6, r6, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) ioctl$KDENABIO(r5, 0x4b36) 15:18:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0b") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x200000d) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 370.069611] FAULT_INJECTION: forcing a failure. [ 370.069611] name failslab, interval 1, probability 0, space 0, times 0 [ 370.156264] CPU: 1 PID: 20741 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 370.163909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.173354] Call Trace: [ 370.175938] dump_stack+0x138/0x197 [ 370.179571] should_fail.cold+0x10f/0x159 [ 370.183747] should_failslab+0xdb/0x130 [ 370.187715] kmem_cache_alloc_trace+0x2e9/0x790 [ 370.192369] ? kasan_check_write+0x14/0x20 [ 370.196591] ? _copy_from_user+0x99/0x110 [ 370.200728] copy_mount_options+0x5c/0x2f0 [ 370.204951] SyS_mount+0x87/0x120 [ 370.208404] ? copy_mnt_ns+0x8c0/0x8c0 [ 370.212278] do_syscall_64+0x1e8/0x640 [ 370.216151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.221093] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.226265] RIP: 0033:0x45c2ca [ 370.229438] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 370.237223] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 370.244476] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 370.251823] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 370.259126] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 370.266383] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:15 executing program 0 (fault-call:11 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 370.380231] loop_set_status: loop0 () has still dirty pages (nrpages=321) 15:18:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0b") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:15 executing program 3 (fault-call:2 fault-nth:53): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 370.461945] FAULT_INJECTION: forcing a failure. [ 370.461945] name failslab, interval 1, probability 0, space 0, times 0 15:18:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x100, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000000c0)={0x6, 0x401}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 370.518777] CPU: 0 PID: 20777 Comm: syz-executor.0 Not tainted 4.14.141 #37 [ 370.525932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.535295] Call Trace: [ 370.537894] dump_stack+0x138/0x197 [ 370.541547] should_fail.cold+0x10f/0x159 [ 370.545700] ? __lock_is_held+0xb6/0x140 [ 370.549769] ? mempool_free+0x1d0/0x1d0 [ 370.553762] should_failslab+0xdb/0x130 [ 370.557841] kmem_cache_alloc+0x47/0x780 [ 370.561918] ? mempool_free+0x1d0/0x1d0 [ 370.565911] mempool_alloc_slab+0x47/0x60 [ 370.565921] mempool_alloc+0x138/0x300 [ 370.565933] ? save_trace+0x290/0x290 [ 370.573957] ? remove_element.isra.0+0x1b0/0x1b0 [ 370.573970] ? find_held_lock+0x35/0x130 [ 370.573983] ? __unlock_page_memcg+0x53/0x100 [ 370.574004] bio_alloc_bioset+0x368/0x680 [ 370.582562] ? bvec_alloc+0x2e0/0x2e0 [ 370.582574] ? __unlock_page_memcg+0x70/0x100 [ 370.582583] ? unlock_page_memcg+0x2c/0x40 [ 370.582597] submit_bh_wbc+0xf6/0x720 [ 370.582609] __block_write_full_page+0x52b/0xa90 [ 370.582618] ? set_init_blocksize+0x220/0x220 [ 370.582632] block_write_full_page+0x1f2/0x250 [ 370.582642] ? __lock_is_held+0xb6/0x140 [ 370.582649] ? set_init_blocksize+0x220/0x220 [ 370.582659] blkdev_writepage+0x25/0x30 [ 370.582668] __writepage+0x5e/0xc0 [ 370.582678] write_cache_pages+0x4db/0xf80 [ 370.582686] ? path_openat+0x193b/0x3f70 [ 370.582696] ? tag_pages_for_writeback+0x2d0/0x2d0 [ 370.582709] ? clear_page_dirty_for_io+0x7f0/0x7f0 [ 370.660107] generic_writepages+0xcc/0x120 [ 370.664333] ? write_cache_pages+0xf80/0xf80 [ 370.668722] ? save_trace+0x290/0x290 [ 370.672507] ? wbc_attach_and_unlock_inode+0x4c0/0x830 [ 370.677769] ? blkdev_readpages+0x40/0x40 [ 370.681990] blkdev_writepages+0x7d/0xd0 [ 370.686122] do_writepages+0xd0/0x250 [ 370.689907] ? page_writeback_cpu_online+0x20/0x20 [ 370.694828] ? _raw_spin_unlock+0x2d/0x50 [ 370.698960] ? wbc_attach_and_unlock_inode+0x559/0x830 [ 370.704220] __filemap_fdatawrite_range+0x23b/0x310 [ 370.709305] ? replace_page_cache_page+0x630/0x630 [ 370.714389] ? __might_fault+0x110/0x1d0 [ 370.718443] filemap_write_and_wait+0x3a/0xb0 [ 370.722930] sync_blockdev+0x5c/0x90 [ 370.726628] loop_set_status+0x263/0x11f0 [ 370.730760] loop_set_status64+0xa6/0xf0 [ 370.734807] ? loop_set_status_old+0x2d0/0x2d0 [ 370.739388] ? ns_capable_common+0x12c/0x160 [ 370.743810] lo_ioctl+0x5c1/0x1ce0 [ 370.747338] ? loop_probe+0x160/0x160 [ 370.751123] blkdev_ioctl+0x96b/0x1860 [ 370.754990] ? blkpg_ioctl+0x980/0x980 [ 370.758868] ? __might_sleep+0x93/0xb0 [ 370.762736] ? __fget+0x210/0x370 [ 370.766172] block_ioctl+0xde/0x120 [ 370.769790] ? blkdev_fallocate+0x3b0/0x3b0 [ 370.774265] do_vfs_ioctl+0x7ae/0x1060 [ 370.778136] ? selinux_file_mprotect+0x5d0/0x5d0 [ 370.783148] ? lock_downgrade+0x6e0/0x6e0 [ 370.787278] ? ioctl_preallocate+0x1c0/0x1c0 [ 370.791674] ? __fget+0x237/0x370 [ 370.795114] ? security_file_ioctl+0x89/0xb0 [ 370.799508] SyS_ioctl+0x8f/0xc0 [ 370.802854] ? do_vfs_ioctl+0x1060/0x1060 [ 370.806985] do_syscall_64+0x1e8/0x640 [ 370.810858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.815689] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.820858] RIP: 0033:0x459879 [ 370.824026] RSP: 002b:00007fd1003dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.831716] RAX: ffffffffffffffda RBX: 00007fd1003dec90 RCX: 0000000000459879 [ 370.838966] RDX: 00000000200000c0 RSI: 0000000000004c04 RDI: 0000000000000004 [ 370.846339] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 370.853652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1003df6d4 [ 370.860920] R13: 00000000004c3089 R14: 00000000004d67d8 R15: 0000000000000006 [ 370.899294] FAULT_INJECTION: forcing a failure. [ 370.899294] name failslab, interval 1, probability 0, space 0, times 0 [ 370.944731] CPU: 0 PID: 20790 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 370.951885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.961248] Call Trace: [ 370.963855] dump_stack+0x138/0x197 [ 370.967620] should_fail.cold+0x10f/0x159 [ 370.971788] should_failslab+0xdb/0x130 [ 370.975780] kmem_cache_alloc+0x2d7/0x780 [ 370.979932] ? lock_downgrade+0x6e0/0x6e0 [ 370.979950] alloc_vfsmnt+0x28/0x7d0 [ 370.979964] vfs_kern_mount.part.0+0x2a/0x3d0 15:18:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:16 executing program 3 (fault-call:2 fault-nth:54): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 370.979977] do_mount+0x417/0x27d0 [ 370.979986] ? copy_mount_options+0x5c/0x2f0 [ 370.979997] ? rcu_read_lock_sched_held+0x110/0x130 [ 370.980013] ? copy_mount_string+0x40/0x40 [ 371.000316] ? copy_mount_options+0x1fe/0x2f0 [ 371.000332] SyS_mount+0xab/0x120 [ 371.000342] ? copy_mnt_ns+0x8c0/0x8c0 [ 371.000355] do_syscall_64+0x1e8/0x640 [ 371.000364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.000380] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.000388] RIP: 0033:0x45c2ca [ 371.000392] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 371.000403] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 371.000407] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 371.000412] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 371.000417] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 371.000422] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:16 executing program 0 (fault-call:11 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 371.160905] print_req_error: I/O error, dev loop2, sector 128 [ 371.199603] FAULT_INJECTION: forcing a failure. [ 371.199603] name failslab, interval 1, probability 0, space 0, times 0 [ 371.213982] CPU: 0 PID: 20812 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 371.221135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.221141] Call Trace: [ 371.221161] dump_stack+0x138/0x197 [ 371.221186] should_fail.cold+0x10f/0x159 [ 371.221213] should_failslab+0xdb/0x130 [ 371.221236] kmem_cache_alloc+0x2d7/0x780 [ 371.221255] ? lock_downgrade+0x6e0/0x6e0 [ 371.221277] alloc_vfsmnt+0x28/0x7d0 [ 371.221293] vfs_kern_mount.part.0+0x2a/0x3d0 [ 371.221316] do_mount+0x417/0x27d0 [ 371.221329] ? copy_mount_options+0x5c/0x2f0 [ 371.221347] ? rcu_read_lock_sched_held+0x110/0x130 [ 371.221360] ? copy_mount_string+0x40/0x40 [ 371.221375] ? copy_mount_options+0x1fe/0x2f0 [ 371.221388] SyS_mount+0xab/0x120 [ 371.221396] ? copy_mnt_ns+0x8c0/0x8c0 [ 371.221407] do_syscall_64+0x1e8/0x640 [ 371.221415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.221429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.221436] RIP: 0033:0x45c2ca [ 371.221442] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 371.221452] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 371.221458] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 371.221470] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 371.221476] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 371.221482] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='*trusted\x00'}, 0x30) fcntl$lock(r2, 0x26, &(0x7f00000001c0)={0x1, 0x2, 0x80, 0x5, r3}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$SIOCRSGL2CALL(r4, 0x89e5, &(0x7f0000000280)=@netrom) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x12000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x5}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x7f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x0, 'lblc\x00', 0x8, 0xb2e, 0x3d}, 0x2c) sendto$inet(r0, &(0x7f0000000680)="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", 0x1000, 0x1, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1}, 0x10) 15:18:16 executing program 3 (fault-call:2 fault-nth:55): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r0 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 371.523965] print_req_error: I/O error, dev loop2, sector 128 [ 371.539426] FAULT_INJECTION: forcing a failure. [ 371.539426] name failslab, interval 1, probability 0, space 0, times 0 [ 371.582344] CPU: 1 PID: 20840 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 371.589504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.598868] Call Trace: [ 371.601473] dump_stack+0x138/0x197 [ 371.605122] should_fail.cold+0x10f/0x159 [ 371.609338] should_failslab+0xdb/0x130 [ 371.613311] __kmalloc_track_caller+0x2ec/0x790 [ 371.617967] ? unwind_get_return_address+0x61/0xa0 [ 371.622922] ? __save_stack_trace+0x7b/0xd0 [ 371.627375] ? btrfs_parse_early_options+0xa3/0x310 [ 371.632389] kstrdup+0x3a/0x70 [ 371.635572] btrfs_parse_early_options+0xa3/0x310 [ 371.640412] ? btrfs_freeze+0xc0/0xc0 [ 371.644373] ? find_next_bit+0x28/0x30 [ 371.648268] ? pcpu_alloc+0xcf0/0x1050 [ 371.652152] ? find_held_lock+0x35/0x130 [ 371.656203] ? pcpu_alloc+0xcf0/0x1050 [ 371.660092] btrfs_mount+0x11d/0x2b28 [ 371.663878] ? lock_downgrade+0x6e0/0x6e0 [ 371.668012] ? find_held_lock+0x35/0x130 [ 371.672063] ? pcpu_alloc+0x3af/0x1050 [ 371.675951] ? _find_next_bit+0xee/0x120 [ 371.679998] ? check_preemption_disabled+0x3c/0x250 [ 371.685006] ? btrfs_remount+0x11f0/0x11f0 [ 371.689225] ? rcu_read_lock_sched_held+0x110/0x130 [ 371.694237] ? __lockdep_init_map+0x10c/0x570 [ 371.698737] ? __lockdep_init_map+0x10c/0x570 [ 371.703241] mount_fs+0x97/0x2a1 [ 371.706602] vfs_kern_mount.part.0+0x5e/0x3d0 [ 371.711096] do_mount+0x417/0x27d0 [ 371.714652] ? copy_mount_options+0x5c/0x2f0 [ 371.719075] ? rcu_read_lock_sched_held+0x110/0x130 [ 371.724181] ? copy_mount_string+0x40/0x40 [ 371.728416] ? copy_mount_options+0x1fe/0x2f0 [ 371.732914] SyS_mount+0xab/0x120 [ 371.736371] ? copy_mnt_ns+0x8c0/0x8c0 [ 371.740242] do_syscall_64+0x1e8/0x640 [ 371.744117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.749217] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.754420] RIP: 0033:0x45c2ca [ 371.757608] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 371.765342] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 371.772610] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 371.779882] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 371.787158] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 371.794512] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 371.817594] IPVS: set_ctl: invalid protocol: 127 172.30.0.3:20000 15:18:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000300)="f373d18fe21db44d78f6907998f063db90006f51a5ad38a0c5374ac7858b414fbf6fa22fbb538681e9b44e04499fa3b04bf929c31b29c41f8e6f2fa28557a030f8348aaccb821450195f96afbb4cb64f7d8cc91b30ae29d1668e379070c3826cdad857ce0a8672a7136fe962ddad3cd4f105421c86c8e18fa75af5ffcab874639bf6c2d22ad3290f6637e0b5d0974373daaba56b7b07d817c143d8d1236811fe50873e", 0xa3, 0x5}], 0x80040, &(0x7f0000000200)='*]\xf1]:\'-vmnet0GPL\x00') ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 371.834419] print_req_error: I/O error, dev loop1, sector 128 15:18:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:17 executing program 3 (fault-call:2 fault-nth:56): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 371.986614] IPVS: set_ctl: invalid protocol: 127 172.30.0.3:20000 15:18:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./file0\x00', 0xc8000, 0x100) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x8001}, &(0x7f0000000140)=0x8) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x64, 0x7, 0x20}, 0x10) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r2, 0x8, 0x1, [0xfff]}, &(0x7f0000000340)=0xa) open(&(0x7f00000002c0)='./file0/file0\x00', 0x1, 0x150) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000001c0)={@loopback, @rand_addr, 0x0}, &(0x7f0000000240)=0xc) bind$packet(r1, &(0x7f0000000280)={0x11, 0x0, r3, 0x1, 0x3, 0x6, @remote}, 0x14) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10003}], 0x0, 0x0) [ 372.028422] FAULT_INJECTION: forcing a failure. [ 372.028422] name failslab, interval 1, probability 0, space 0, times 0 15:18:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 372.090270] loop_set_status: loop0 () has still dirty pages (nrpages=16) [ 372.106973] CPU: 1 PID: 20875 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 372.114122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.123487] Call Trace: [ 372.126084] dump_stack+0x138/0x197 [ 372.129729] should_fail.cold+0x10f/0x159 [ 372.133897] should_failslab+0xdb/0x130 15:18:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 372.137895] __kmalloc_track_caller+0x2ec/0x790 [ 372.142574] ? kstrdup_const+0x48/0x60 [ 372.146501] kstrdup+0x3a/0x70 [ 372.149701] kstrdup_const+0x48/0x60 [ 372.153422] alloc_vfsmnt+0xe5/0x7d0 [ 372.157255] vfs_kern_mount.part.0+0x2a/0x3d0 [ 372.161766] do_mount+0x417/0x27d0 [ 372.165316] ? copy_mount_options+0x5c/0x2f0 [ 372.169724] ? rcu_read_lock_sched_held+0x110/0x130 [ 372.174758] ? copy_mount_string+0x40/0x40 [ 372.178999] ? copy_mount_options+0x1fe/0x2f0 [ 372.183500] SyS_mount+0xab/0x120 [ 372.186982] ? copy_mnt_ns+0x8c0/0x8c0 [ 372.190893] do_syscall_64+0x1e8/0x640 [ 372.194817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.199674] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.204883] RIP: 0033:0x45c2ca [ 372.208071] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 372.215868] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 372.215879] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 372.215885] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 15:18:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 372.215890] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 372.215895] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 372.256645] print_req_error: I/O error, dev loop2, sector 128 [ 372.263032] print_req_error: I/O error, dev loop1, sector 128 [ 372.269688] print_req_error: I/O error, dev loop2, sector 128 [ 372.270445] loop_set_status: loop0 () has still dirty pages (nrpages=1) 15:18:17 executing program 3 (fault-call:2 fault-nth:57): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 372.364548] print_req_error: I/O error, dev loop2, sector 128 [ 372.382283] FAULT_INJECTION: forcing a failure. [ 372.382283] name failslab, interval 1, probability 0, space 0, times 0 [ 372.393993] loop_set_status: loop0 () has still dirty pages (nrpages=1) 15:18:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000300)=""/189, 0xbd, 0x20, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r0, 0x0, 0x101, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 372.481993] CPU: 1 PID: 20913 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 372.489146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.498508] Call Trace: [ 372.501108] dump_stack+0x138/0x197 [ 372.504751] should_fail.cold+0x10f/0x159 [ 372.508998] should_failslab+0xdb/0x130 [ 372.512994] kmem_cache_alloc+0x2d7/0x780 [ 372.517162] ? check_preemption_disabled+0x3c/0x250 [ 372.522190] alloc_vfsmnt+0x28/0x7d0 [ 372.525923] vfs_kern_mount.part.0+0x2a/0x3d0 [ 372.530423] ? find_held_lock+0x35/0x130 [ 372.534605] vfs_kern_mount+0x40/0x60 [ 372.538418] btrfs_mount+0x3ce/0x2b28 [ 372.542220] ? lock_downgrade+0x6e0/0x6e0 [ 372.546356] ? find_held_lock+0x35/0x130 [ 372.546367] ? pcpu_alloc+0x3af/0x1050 [ 372.546386] ? btrfs_remount+0x11f0/0x11f0 [ 372.546400] ? rcu_read_lock_sched_held+0x110/0x130 [ 372.564090] ? __lockdep_init_map+0x10c/0x570 [ 372.568578] ? __lockdep_init_map+0x10c/0x570 [ 372.573065] mount_fs+0x97/0x2a1 [ 372.576423] vfs_kern_mount.part.0+0x5e/0x3d0 [ 372.580906] do_mount+0x417/0x27d0 [ 372.584427] ? copy_mount_options+0x5c/0x2f0 [ 372.588819] ? rcu_read_lock_sched_held+0x110/0x130 [ 372.593823] ? copy_mount_string+0x40/0x40 [ 372.598251] ? copy_mount_options+0x1fe/0x2f0 [ 372.602822] SyS_mount+0xab/0x120 [ 372.606267] ? copy_mnt_ns+0x8c0/0x8c0 [ 372.610222] do_syscall_64+0x1e8/0x640 [ 372.614090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.618919] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.624095] RIP: 0033:0x45c2ca [ 372.627274] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 372.634966] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 372.642312] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 372.649567] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 372.656847] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 372.664100] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x40000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f00000001c0)={0xf, 0x1f, 0x1, 0xffff}, 0xf) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000000, 0x2002) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000140)={r3, 0x3}) 15:18:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:17 executing program 3 (fault-call:2 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 372.905364] FAULT_INJECTION: forcing a failure. [ 372.905364] name failslab, interval 1, probability 0, space 0, times 0 [ 372.929353] print_req_error: I/O error, dev loop1, sector 128 [ 372.991850] CPU: 1 PID: 20947 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 372.998999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.999005] Call Trace: [ 372.999025] dump_stack+0x138/0x197 [ 372.999042] should_fail.cold+0x10f/0x159 [ 372.999059] should_failslab+0xdb/0x130 [ 373.011050] kmem_cache_alloc+0x2d7/0x780 [ 373.011065] ? check_preemption_disabled+0x3c/0x250 [ 373.011080] alloc_vfsmnt+0x28/0x7d0 [ 373.011091] vfs_kern_mount.part.0+0x2a/0x3d0 [ 373.011101] ? find_held_lock+0x35/0x130 [ 373.011112] vfs_kern_mount+0x40/0x60 [ 373.011128] btrfs_mount+0x3ce/0x2b28 [ 373.052357] ? lock_downgrade+0x6e0/0x6e0 [ 373.056649] ? find_held_lock+0x35/0x130 [ 373.060698] ? pcpu_alloc+0x3af/0x1050 [ 373.064578] ? btrfs_remount+0x11f0/0x11f0 [ 373.069880] ? rcu_read_lock_sched_held+0x110/0x130 [ 373.074991] ? __lockdep_init_map+0x10c/0x570 [ 373.079590] ? __lockdep_init_map+0x10c/0x570 [ 373.084080] mount_fs+0x97/0x2a1 [ 373.087540] vfs_kern_mount.part.0+0x5e/0x3d0 [ 373.092020] do_mount+0x417/0x27d0 [ 373.095546] ? retint_kernel+0x2d/0x2d [ 373.099435] ? copy_mount_string+0x40/0x40 [ 373.103667] ? copy_mount_options+0x199/0x2f0 [ 373.108146] ? copy_mount_options+0x1fe/0x2f0 [ 373.112724] SyS_mount+0xab/0x120 [ 373.116170] ? copy_mnt_ns+0x8c0/0x8c0 [ 373.120431] do_syscall_64+0x1e8/0x640 [ 373.124302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.129130] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.134302] RIP: 0033:0x45c2ca [ 373.137505] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 373.145199] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 373.152456] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 373.159712] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 373.166983] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 373.174253] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:18 executing program 3 (fault-call:2 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 373.212046] print_req_error: I/O error, dev loop2, sector 128 [ 373.230166] loop_set_status: loop0 () has still dirty pages (nrpages=320) [ 373.251430] print_req_error: I/O error, dev loop1, sector 128 15:18:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) sched_getscheduler(r1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10001}], 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141080, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) [ 373.353117] FAULT_INJECTION: forcing a failure. [ 373.353117] name failslab, interval 1, probability 0, space 0, times 0 [ 373.403847] CPU: 1 PID: 20980 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 373.411003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.420365] Call Trace: [ 373.423064] dump_stack+0x138/0x197 [ 373.426716] should_fail.cold+0x10f/0x159 [ 373.430884] should_failslab+0xdb/0x130 [ 373.434877] __kmalloc_track_caller+0x2ec/0x790 [ 373.439556] ? unwind_get_return_address+0x61/0xa0 [ 373.444502] ? __save_stack_trace+0x7b/0xd0 [ 373.448836] ? btrfs_parse_early_options+0xa3/0x310 [ 373.453901] kstrdup+0x3a/0x70 [ 373.457116] btrfs_parse_early_options+0xa3/0x310 [ 373.461971] ? save_trace+0x290/0x290 [ 373.465877] ? btrfs_freeze+0xc0/0xc0 [ 373.469680] ? find_next_bit+0x28/0x30 [ 373.473560] ? pcpu_alloc+0xcf0/0x1050 [ 373.473572] ? find_held_lock+0x35/0x130 [ 373.473579] ? pcpu_alloc+0xcf0/0x1050 [ 373.473595] btrfs_mount+0x11d/0x2b28 [ 373.473603] ? lock_downgrade+0x6e0/0x6e0 [ 373.473609] ? find_held_lock+0x35/0x130 [ 373.473619] ? pcpu_alloc+0x3af/0x1050 [ 373.501292] ? _find_next_bit+0xee/0x120 [ 373.505381] ? check_preemption_disabled+0x3c/0x250 [ 373.510761] ? btrfs_remount+0x11f0/0x11f0 [ 373.515011] ? rcu_read_lock_sched_held+0x110/0x130 [ 373.520041] ? __lockdep_init_map+0x10c/0x570 [ 373.524545] ? __lockdep_init_map+0x10c/0x570 [ 373.529164] mount_fs+0x97/0x2a1 [ 373.532545] vfs_kern_mount.part.0+0x5e/0x3d0 [ 373.537046] ? find_held_lock+0x35/0x130 [ 373.541117] vfs_kern_mount+0x40/0x60 [ 373.544924] btrfs_mount+0x3ce/0x2b28 [ 373.548731] ? lock_downgrade+0x6e0/0x6e0 [ 373.552885] ? find_held_lock+0x35/0x130 [ 373.556951] ? pcpu_alloc+0x3af/0x1050 [ 373.560850] ? btrfs_remount+0x11f0/0x11f0 [ 373.565094] ? rcu_read_lock_sched_held+0x110/0x130 [ 373.570128] ? __lockdep_init_map+0x10c/0x570 [ 373.574629] ? __lockdep_init_map+0x10c/0x570 [ 373.579132] mount_fs+0x97/0x2a1 [ 373.582514] vfs_kern_mount.part.0+0x5e/0x3d0 [ 373.587017] do_mount+0x417/0x27d0 [ 373.590571] ? copy_mount_options+0x5c/0x2f0 [ 373.595104] ? rcu_read_lock_sched_held+0x110/0x130 [ 373.600132] ? copy_mount_string+0x40/0x40 [ 373.604376] ? copy_mount_options+0x1fe/0x2f0 [ 373.608969] SyS_mount+0xab/0x120 [ 373.612431] ? copy_mnt_ns+0x8c0/0x8c0 [ 373.616334] do_syscall_64+0x1e8/0x640 [ 373.620224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.625078] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.630280] RIP: 0033:0x45c2ca [ 373.633472] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 373.641186] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 373.648581] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 373.655854] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 373.663336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 373.670623] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000240)="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"/269) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x1, 0x4fe9) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) pwritev(r0, 0x0, 0xfffffffffffffd85, 0x1081804) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e23, @broadcast}, {0x306}, 0x20, {0x2, 0x4e20, @broadcast}, 'bcsh0\x00'}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:18 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:18 executing program 3 (fault-call:2 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 374.013070] FAULT_INJECTION: forcing a failure. [ 374.013070] name failslab, interval 1, probability 0, space 0, times 0 [ 374.035356] CPU: 1 PID: 21030 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 374.042505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.051859] Call Trace: [ 374.054505] dump_stack+0x138/0x197 [ 374.058134] should_fail.cold+0x10f/0x159 [ 374.062283] should_failslab+0xdb/0x130 [ 374.066254] __kmalloc_track_caller+0x2ec/0x790 [ 374.071208] ? unwind_get_return_address+0x61/0xa0 [ 374.076130] ? __save_stack_trace+0x7b/0xd0 [ 374.080442] ? btrfs_parse_early_options+0xa3/0x310 [ 374.085451] kstrdup+0x3a/0x70 [ 374.088636] btrfs_parse_early_options+0xa3/0x310 [ 374.093499] ? save_trace+0x290/0x290 [ 374.097290] ? btrfs_freeze+0xc0/0xc0 [ 374.101075] ? pcpu_alloc+0xcf0/0x1050 [ 374.105051] ? find_held_lock+0x35/0x130 [ 374.109106] ? pcpu_alloc+0xcf0/0x1050 [ 374.113116] btrfs_mount+0x11d/0x2b28 [ 374.116916] ? lock_downgrade+0x6e0/0x6e0 [ 374.121067] ? find_held_lock+0x35/0x130 [ 374.125136] ? pcpu_alloc+0x3af/0x1050 [ 374.129013] ? _find_next_bit+0xee/0x120 [ 374.133060] ? check_preemption_disabled+0x3c/0x250 [ 374.142158] ? btrfs_remount+0x11f0/0x11f0 [ 374.146391] ? rcu_read_lock_sched_held+0x110/0x130 [ 374.151405] ? __lockdep_init_map+0x10c/0x570 [ 374.155881] ? __lockdep_init_map+0x10c/0x570 [ 374.160541] mount_fs+0x97/0x2a1 [ 374.163896] vfs_kern_mount.part.0+0x5e/0x3d0 [ 374.168413] ? find_held_lock+0x35/0x130 [ 374.172585] vfs_kern_mount+0x40/0x60 [ 374.176466] btrfs_mount+0x3ce/0x2b28 [ 374.180266] ? lock_downgrade+0x6e0/0x6e0 [ 374.184419] ? find_held_lock+0x35/0x130 [ 374.188472] ? pcpu_alloc+0x3af/0x1050 [ 374.192367] ? btrfs_remount+0x11f0/0x11f0 [ 374.196762] ? rcu_read_lock_sched_held+0x110/0x130 [ 374.201779] ? __lockdep_init_map+0x10c/0x570 [ 374.206285] ? __lockdep_init_map+0x10c/0x570 [ 374.210793] mount_fs+0x97/0x2a1 [ 374.214162] vfs_kern_mount.part.0+0x5e/0x3d0 [ 374.218644] do_mount+0x417/0x27d0 [ 374.222167] ? copy_mount_options+0x5c/0x2f0 [ 374.226565] ? rcu_read_lock_sched_held+0x110/0x130 [ 374.231616] ? copy_mount_string+0x40/0x40 [ 374.235844] ? copy_mount_options+0x1fe/0x2f0 [ 374.240350] SyS_mount+0xab/0x120 [ 374.243812] ? copy_mnt_ns+0x8c0/0x8c0 [ 374.247695] do_syscall_64+0x1e8/0x640 [ 374.251588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.256430] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.261742] RIP: 0033:0x45c2ca [ 374.264919] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 374.272806] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 374.280234] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 374.287487] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 374.294746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 374.302008] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:19 executing program 2: r0 = getpid() r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0xfffffffffffffffe, 0x6, 0x7, 0x8, 0x0, 0x1, 0x8000, 0x4, 0x5, 0x1b58, 0x9, 0x644, 0x7fffffff, 0xaa, 0x10001, 0x200, 0x100, 0xc22f, 0x8, 0x1, 0x5, 0x5, 0x0, 0x9, 0x9, 0x5, 0x8, 0x2, 0x6, 0x5, 0x0, 0x7, 0x28, 0x1, 0xf2, 0xfffffffffffffff9, 0x0, 0x7616, 0x1, @perf_config_ext={0x8, 0x20}, 0x0, 0x100, 0x1, 0x3, 0x21, 0x2, 0x1}, r0, 0xa, r1, 0xb) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:19 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffc1, 0x8000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000280)={0xffffffff, 0x10001, 0x4, @random='dO)cA[', 'bridge_slave_1\x00'}) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300), 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) write$FUSE_INIT(r4, &(0x7f00000001c0)={0x50, 0xfffffffffffffff5, 0x2, {0x7, 0x1f, 0xbe4, 0x800002, 0x8, 0x1000, 0x7, 0x9}}, 0x50) semget(0x0, 0x0, 0x1) 15:18:19 executing program 3 (fault-call:2 fault-nth:61): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:19 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 374.585335] FAULT_INJECTION: forcing a failure. [ 374.585335] name failslab, interval 1, probability 0, space 0, times 0 [ 374.633078] CPU: 1 PID: 21065 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 374.640233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.649604] Call Trace: [ 374.649628] dump_stack+0x138/0x197 [ 374.649644] should_fail.cold+0x10f/0x159 [ 374.649665] should_failslab+0xdb/0x130 [ 374.655865] __kmalloc_track_caller+0x2ec/0x790 [ 374.663955] ? unwind_get_return_address+0x61/0xa0 [ 374.663967] ? __save_stack_trace+0x7b/0xd0 [ 374.663984] ? btrfs_parse_early_options+0xa3/0x310 [ 374.673559] kstrdup+0x3a/0x70 [ 374.673574] btrfs_parse_early_options+0xa3/0x310 [ 374.673586] ? save_trace+0x290/0x290 [ 374.673595] ? btrfs_freeze+0xc0/0xc0 [ 374.673605] ? pcpu_alloc+0xcf0/0x1050 [ 374.673615] ? find_held_lock+0x35/0x130 [ 374.673623] ? pcpu_alloc+0xcf0/0x1050 [ 374.673636] btrfs_mount+0x11d/0x2b28 [ 374.714533] ? lock_downgrade+0x6e0/0x6e0 [ 374.718685] ? find_held_lock+0x35/0x130 [ 374.722749] ? pcpu_alloc+0x3af/0x1050 [ 374.722765] ? _find_next_bit+0xee/0x120 [ 374.722775] ? check_preemption_disabled+0x3c/0x250 [ 374.722789] ? btrfs_remount+0x11f0/0x11f0 [ 374.730723] ? rcu_read_lock_sched_held+0x110/0x130 [ 374.730742] ? __lockdep_init_map+0x10c/0x570 [ 374.730752] ? __lockdep_init_map+0x10c/0x570 [ 374.730768] mount_fs+0x97/0x2a1 [ 374.757421] vfs_kern_mount.part.0+0x5e/0x3d0 [ 374.761914] ? find_held_lock+0x35/0x130 [ 374.765985] vfs_kern_mount+0x40/0x60 [ 374.769806] btrfs_mount+0x3ce/0x2b28 [ 374.773603] ? lock_downgrade+0x6e0/0x6e0 [ 374.777758] ? find_held_lock+0x35/0x130 [ 374.781898] ? pcpu_alloc+0x3af/0x1050 [ 374.785778] ? btrfs_remount+0x11f0/0x11f0 [ 374.790016] ? rcu_read_lock_sched_held+0x110/0x130 [ 374.795027] ? __lockdep_init_map+0x10c/0x570 [ 374.799510] ? __lockdep_init_map+0x10c/0x570 [ 374.803996] mount_fs+0x97/0x2a1 [ 374.807354] vfs_kern_mount.part.0+0x5e/0x3d0 [ 374.811842] do_mount+0x417/0x27d0 [ 374.815370] ? copy_mount_options+0x5c/0x2f0 [ 374.819764] ? rcu_read_lock_sched_held+0x110/0x130 [ 374.824773] ? copy_mount_string+0x40/0x40 [ 374.829000] ? copy_mount_options+0x1fe/0x2f0 [ 374.833486] SyS_mount+0xab/0x120 [ 374.836927] ? copy_mnt_ns+0x8c0/0x8c0 [ 374.840825] do_syscall_64+0x1e8/0x640 [ 374.844706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.849651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.854855] RIP: 0033:0x45c2ca [ 374.858042] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 374.865754] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 374.873035] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 374.880315] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 374.887662] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 374.894917] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000000c0)=0x1, 0x4) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0xc0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x7) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:20 executing program 3 (fault-call:2 fault-nth:62): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x0, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 375.095715] FAULT_INJECTION: forcing a failure. [ 375.095715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 375.111039] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:18:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 375.169777] CPU: 0 PID: 21105 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 375.176942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.186517] Call Trace: [ 375.189204] dump_stack+0x138/0x197 [ 375.192823] should_fail.cold+0x10f/0x159 [ 375.197162] ? __might_sleep+0x93/0xb0 [ 375.201038] __alloc_pages_nodemask+0x1d6/0x7a0 [ 375.205697] ? trace_hardirqs_on+0xd/0x10 [ 375.209839] ? __alloc_pages_slowpath+0x2930/0x2930 [ 375.215031] ? btrfs_parse_early_options+0x1a2/0x310 [ 375.220141] alloc_pages_current+0xec/0x1e0 [ 375.224611] __get_free_pages+0xf/0x40 [ 375.228502] get_zeroed_page+0x11/0x20 [ 375.232391] parse_security_options+0x1f/0xa0 [ 375.236890] btrfs_mount+0x2bb/0x2b28 [ 375.240705] ? lock_downgrade+0x6e0/0x6e0 [ 375.244945] ? find_held_lock+0x35/0x130 [ 375.249002] ? pcpu_alloc+0x3af/0x1050 [ 375.252903] ? btrfs_remount+0x11f0/0x11f0 [ 375.257136] ? rcu_read_lock_sched_held+0x110/0x130 [ 375.262174] ? __lockdep_init_map+0x10c/0x570 [ 375.266671] mount_fs+0x97/0x2a1 [ 375.270035] vfs_kern_mount.part.0+0x5e/0x3d0 [ 375.274524] ? find_held_lock+0x35/0x130 [ 375.278594] vfs_kern_mount+0x40/0x60 [ 375.282407] btrfs_mount+0x3ce/0x2b28 [ 375.286208] ? lock_downgrade+0x6e0/0x6e0 [ 375.290355] ? find_held_lock+0x35/0x130 [ 375.294412] ? pcpu_alloc+0x3af/0x1050 [ 375.298286] ? btrfs_remount+0x11f0/0x11f0 [ 375.302506] ? rcu_read_lock_sched_held+0x110/0x130 [ 375.307511] ? __lockdep_init_map+0x10c/0x570 [ 375.312012] ? __lockdep_init_map+0x10c/0x570 [ 375.316516] mount_fs+0x97/0x2a1 [ 375.319882] vfs_kern_mount.part.0+0x5e/0x3d0 [ 375.324380] do_mount+0x417/0x27d0 [ 375.327906] ? copy_mount_options+0x5c/0x2f0 [ 375.332324] ? rcu_read_lock_sched_held+0x110/0x130 [ 375.337343] ? copy_mount_string+0x40/0x40 [ 375.341567] ? copy_mount_options+0x1fe/0x2f0 [ 375.346050] SyS_mount+0xab/0x120 [ 375.349490] ? copy_mnt_ns+0x8c0/0x8c0 [ 375.353372] do_syscall_64+0x1e8/0x640 [ 375.357261] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.362105] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 375.367295] RIP: 0033:0x45c2ca [ 375.370477] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 375.378168] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 375.385421] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 375.392674] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 375.399927] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 375.407181] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getegid() 15:18:20 executing program 3 (fault-call:2 fault-nth:63): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x0, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 375.649897] FAULT_INJECTION: forcing a failure. [ 375.649897] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 375.668911] CPU: 1 PID: 21150 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 375.676057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.685433] Call Trace: [ 375.688116] dump_stack+0x138/0x197 [ 375.691806] should_fail.cold+0x10f/0x159 [ 375.695943] ? __might_sleep+0x93/0xb0 [ 375.699816] __alloc_pages_nodemask+0x1d6/0x7a0 [ 375.704468] ? check_preemption_disabled+0x3c/0x250 [ 375.709560] ? __alloc_pages_slowpath+0x2930/0x2930 [ 375.714565] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 375.719995] ? __alloc_pages_nodemask+0x639/0x7a0 [ 375.724847] alloc_pages_current+0xec/0x1e0 [ 375.729159] ? btrfs_parse_early_options+0x1a2/0x310 [ 375.734335] __get_free_pages+0xf/0x40 [ 375.738228] get_zeroed_page+0x11/0x20 [ 375.742203] selinux_sb_copy_data+0x2a/0x390 [ 375.746599] security_sb_copy_data+0x75/0xb0 [ 375.750992] parse_security_options+0x37/0xa0 [ 375.755473] btrfs_mount+0x2bb/0x2b28 [ 375.759260] ? lock_downgrade+0x6e0/0x6e0 [ 375.763390] ? find_held_lock+0x35/0x130 [ 375.767534] ? pcpu_alloc+0x3af/0x1050 [ 375.771426] ? btrfs_remount+0x11f0/0x11f0 [ 375.775667] ? rcu_read_lock_sched_held+0x110/0x130 [ 375.780679] ? __lockdep_init_map+0x10c/0x570 [ 375.785169] mount_fs+0x97/0x2a1 [ 375.788520] vfs_kern_mount.part.0+0x5e/0x3d0 [ 375.793007] ? find_held_lock+0x35/0x130 [ 375.797059] vfs_kern_mount+0x40/0x60 [ 375.800877] btrfs_mount+0x3ce/0x2b28 [ 375.804691] ? lock_downgrade+0x6e0/0x6e0 [ 375.808833] ? find_held_lock+0x35/0x130 [ 375.812905] ? pcpu_alloc+0x3af/0x1050 [ 375.816920] ? btrfs_remount+0x11f0/0x11f0 [ 375.821195] ? rcu_read_lock_sched_held+0x110/0x130 [ 375.826216] ? __lockdep_init_map+0x10c/0x570 [ 375.830696] ? __lockdep_init_map+0x10c/0x570 [ 375.835353] mount_fs+0x97/0x2a1 [ 375.838707] vfs_kern_mount.part.0+0x5e/0x3d0 [ 375.843191] do_mount+0x417/0x27d0 [ 375.846713] ? copy_mount_options+0x5c/0x2f0 [ 375.851195] ? rcu_read_lock_sched_held+0x110/0x130 [ 375.856336] ? copy_mount_string+0x40/0x40 [ 375.860681] ? copy_mount_options+0x1fe/0x2f0 [ 375.865176] SyS_mount+0xab/0x120 [ 375.868618] ? copy_mnt_ns+0x8c0/0x8c0 [ 375.872587] do_syscall_64+0x1e8/0x640 [ 375.876558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.881827] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 375.887049] RIP: 0033:0x45c2ca [ 375.890231] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 15:18:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fgetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000140)=""/108, 0x6c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 375.897926] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 375.905177] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 375.912429] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 375.919699] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 375.927059] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000080)={0x5, &(0x7f0000000300)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}]}) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, 0x0, 0xfffffcde, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) eventfd(0x20000005) close(r1) getegid() ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000200)) umount2(&(0x7f00000001c0)='./file0\x00', 0x1) 15:18:21 executing program 3 (fault-call:2 fault-nth:64): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 376.127403] FAULT_INJECTION: forcing a failure. [ 376.127403] name failslab, interval 1, probability 0, space 0, times 0 [ 376.188087] CPU: 1 PID: 21170 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 376.195239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.204682] Call Trace: [ 376.207346] dump_stack+0x138/0x197 [ 376.210991] should_fail.cold+0x10f/0x159 [ 376.215157] should_failslab+0xdb/0x130 [ 376.219144] kmem_cache_alloc_trace+0x2e9/0x790 [ 376.219167] selinux_parse_opts_str+0x3c1/0xa30 [ 376.219183] ? selinux_sb_show_options+0xd50/0xd50 [ 376.228537] ? free_pages+0x46/0x50 [ 376.237096] ? selinux_sb_copy_data+0x21e/0x390 [ 376.241783] security_sb_parse_opts_str+0x75/0xb0 [ 376.246814] parse_security_options+0x4e/0xa0 [ 376.251324] btrfs_mount+0x2bb/0x2b28 [ 376.255137] ? lock_downgrade+0x6e0/0x6e0 [ 376.259463] ? find_held_lock+0x35/0x130 [ 376.263535] ? pcpu_alloc+0x3af/0x1050 [ 376.267588] ? btrfs_remount+0x11f0/0x11f0 [ 376.271825] ? rcu_read_lock_sched_held+0x110/0x130 [ 376.276947] ? __lockdep_init_map+0x10c/0x570 [ 376.281438] mount_fs+0x97/0x2a1 [ 376.284794] vfs_kern_mount.part.0+0x5e/0x3d0 [ 376.289269] ? find_held_lock+0x35/0x130 [ 376.293603] vfs_kern_mount+0x40/0x60 [ 376.297396] btrfs_mount+0x3ce/0x2b28 [ 376.301378] ? lock_downgrade+0x6e0/0x6e0 [ 376.305523] ? find_held_lock+0x35/0x130 [ 376.309566] ? pcpu_alloc+0x3af/0x1050 [ 376.313559] ? btrfs_remount+0x11f0/0x11f0 [ 376.317998] ? rcu_read_lock_sched_held+0x110/0x130 [ 376.323007] ? __lockdep_init_map+0x10c/0x570 [ 376.327492] ? __lockdep_init_map+0x10c/0x570 [ 376.331977] mount_fs+0x97/0x2a1 [ 376.335435] vfs_kern_mount.part.0+0x5e/0x3d0 [ 376.339932] do_mount+0x417/0x27d0 [ 376.343476] ? copy_mount_options+0x5c/0x2f0 [ 376.347903] ? rcu_read_lock_sched_held+0x110/0x130 [ 376.352902] ? copy_mount_string+0x40/0x40 [ 376.357148] ? copy_mount_options+0x1fe/0x2f0 [ 376.361629] SyS_mount+0xab/0x120 [ 376.365081] ? copy_mnt_ns+0x8c0/0x8c0 [ 376.368953] do_syscall_64+0x1e8/0x640 [ 376.372825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.377656] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.382829] RIP: 0033:0x45c2ca 15:18:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 376.386004] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 376.394068] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 376.401427] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 376.408770] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 376.416037] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 376.423304] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 376.451323] loop_set_status: loop0 () has still dirty pages (nrpages=320) 15:18:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x423, &(0x7f0000000140)="11dcb60d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 376.493717] print_req_error: 3 callbacks suppressed [ 376.493722] print_req_error: I/O error, dev loop2, sector 128 15:18:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = dup3(r1, r1, 0x80000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000300)={{0x3, 0x7ff}, 'port1\x00', 0x20, 0x8, 0xffff, 0x6f90, 0x9, 0x3, 0x1f, 0x0, 0x7, 0x1}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:21 executing program 3 (fault-call:2 fault-nth:65): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:18:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x0, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 376.683298] FAULT_INJECTION: forcing a failure. [ 376.683298] name failslab, interval 1, probability 0, space 0, times 0 [ 376.700489] CPU: 0 PID: 21219 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 376.707632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.717123] Call Trace: [ 376.717145] dump_stack+0x138/0x197 [ 376.723370] should_fail.cold+0x10f/0x159 [ 376.723386] should_failslab+0xdb/0x130 [ 376.723400] kmem_cache_alloc_trace+0x2e9/0x790 [ 376.723419] selinux_parse_opts_str+0x42c/0xa30 [ 376.723435] ? selinux_sb_show_options+0xd50/0xd50 [ 376.745992] ? free_pages+0x46/0x50 [ 376.749637] ? selinux_sb_copy_data+0x21e/0x390 [ 376.754675] security_sb_parse_opts_str+0x75/0xb0 [ 376.759618] parse_security_options+0x4e/0xa0 [ 376.764392] btrfs_mount+0x2bb/0x2b28 [ 376.768214] ? lock_downgrade+0x6e0/0x6e0 [ 376.772371] ? find_held_lock+0x35/0x130 [ 376.776433] ? pcpu_alloc+0x3af/0x1050 [ 376.776455] ? btrfs_remount+0x11f0/0x11f0 [ 376.776471] ? rcu_read_lock_sched_held+0x110/0x130 [ 376.776491] ? __lockdep_init_map+0x10c/0x570 [ 376.784820] mount_fs+0x97/0x2a1 [ 376.784837] vfs_kern_mount.part.0+0x5e/0x3d0 [ 376.784847] ? find_held_lock+0x35/0x130 [ 376.784858] vfs_kern_mount+0x40/0x60 [ 376.784872] btrfs_mount+0x3ce/0x2b28 [ 376.797714] ? lock_downgrade+0x6e0/0x6e0 [ 376.797724] ? find_held_lock+0x35/0x130 [ 376.797735] ? pcpu_alloc+0x3af/0x1050 [ 376.797753] ? btrfs_remount+0x11f0/0x11f0 [ 376.797769] ? rcu_read_lock_sched_held+0x110/0x130 [ 376.826525] ? __lockdep_init_map+0x10c/0x570 [ 376.826538] ? __lockdep_init_map+0x10c/0x570 [ 376.826554] mount_fs+0x97/0x2a1 [ 376.826570] vfs_kern_mount.part.0+0x5e/0x3d0 [ 376.852779] do_mount+0x417/0x27d0 [ 376.856580] ? copy_mount_options+0x5c/0x2f0 [ 376.860976] ? rcu_read_lock_sched_held+0x110/0x130 [ 376.865984] ? copy_mount_string+0x40/0x40 [ 376.870245] ? copy_mount_options+0x1fe/0x2f0 [ 376.874738] SyS_mount+0xab/0x120 [ 376.878444] ? copy_mnt_ns+0x8c0/0x8c0 [ 376.882511] do_syscall_64+0x1e8/0x640 [ 376.886377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.891220] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.896657] RIP: 0033:0x45c2ca [ 376.899838] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 376.907528] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 376.914793] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 376.922043] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 15:18:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 376.929313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 376.936567] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008913, &(0x7f0000000280)="000000000000e8ffffff00") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x10302, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000200)) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) getrusage(0x0, &(0x7f0000000300)) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = dup(r0) recvfrom$inet6(r4, &(0x7f0000000000)=""/22, 0x16, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @local}, 0x1c) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 15:18:22 executing program 3 (fault-call:2 fault-nth:66): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, 0x0, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 377.190429] FAULT_INJECTION: forcing a failure. [ 377.190429] name failslab, interval 1, probability 0, space 0, times 0 [ 377.230943] CPU: 0 PID: 21269 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 377.238109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.238115] Call Trace: [ 377.238135] dump_stack+0x138/0x197 [ 377.238153] should_fail.cold+0x10f/0x159 [ 377.250100] should_failslab+0xdb/0x130 [ 377.250115] kmem_cache_alloc_trace+0x2e9/0x790 [ 377.250132] selinux_parse_opts_str+0x3c1/0xa30 [ 377.250146] ? selinux_sb_show_options+0xd50/0xd50 [ 377.258225] ? free_pages+0x46/0x50 [ 377.281193] ? selinux_sb_copy_data+0x21e/0x390 [ 377.285882] security_sb_parse_opts_str+0x75/0xb0 [ 377.290837] parse_security_options+0x4e/0xa0 [ 377.295342] btrfs_mount+0x2bb/0x2b28 [ 377.299164] ? lock_downgrade+0x6e0/0x6e0 [ 377.303581] ? find_held_lock+0x35/0x130 [ 377.307730] ? pcpu_alloc+0x3af/0x1050 [ 377.311678] ? btrfs_remount+0x11f0/0x11f0 [ 377.315932] ? rcu_read_lock_sched_held+0x110/0x130 [ 377.320961] ? __lockdep_init_map+0x10c/0x570 [ 377.325459] mount_fs+0x97/0x2a1 [ 377.328824] vfs_kern_mount.part.0+0x5e/0x3d0 [ 377.333302] ? find_held_lock+0x35/0x130 [ 377.337348] vfs_kern_mount+0x40/0x60 [ 377.341136] btrfs_mount+0x3ce/0x2b28 [ 377.344935] ? lock_downgrade+0x6e0/0x6e0 [ 377.349087] ? find_held_lock+0x35/0x130 [ 377.353514] ? pcpu_alloc+0x3af/0x1050 [ 377.357416] ? btrfs_remount+0x11f0/0x11f0 [ 377.361638] ? rcu_read_lock_sched_held+0x110/0x130 [ 377.366644] ? __lockdep_init_map+0x10c/0x570 [ 377.371122] ? __lockdep_init_map+0x10c/0x570 [ 377.375784] mount_fs+0x97/0x2a1 [ 377.379136] vfs_kern_mount.part.0+0x5e/0x3d0 [ 377.383620] do_mount+0x417/0x27d0 [ 377.387143] ? copy_mount_string+0x40/0x40 [ 377.391360] ? copy_mount_options+0x18f/0x2f0 [ 377.395842] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 377.400669] ? copy_mount_options+0x1fe/0x2f0 [ 377.405672] SyS_mount+0xab/0x120 [ 377.409108] ? copy_mnt_ns+0x8c0/0x8c0 [ 377.412983] do_syscall_64+0x1e8/0x640 [ 377.416860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 377.421718] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 377.426911] RIP: 0033:0x45c2ca [ 377.430092] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 377.437795] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 377.445049] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 377.452564] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 377.459816] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 377.467069] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x4, 0x111000) renameat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 377.520535] loop_set_status: loop0 () has still dirty pages (nrpages=1) 15:18:22 executing program 3 (fault-call:2 fault-nth:67): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 377.615284] print_req_error: I/O error, dev loop2, sector 128 [ 377.625301] FAULT_INJECTION: forcing a failure. [ 377.625301] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 377.652364] CPU: 0 PID: 21297 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 377.659506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.659511] Call Trace: [ 377.659528] dump_stack+0x138/0x197 [ 377.659548] should_fail.cold+0x10f/0x159 [ 377.659559] ? __might_sleep+0x93/0xb0 [ 377.659571] __alloc_pages_nodemask+0x1d6/0x7a0 [ 377.659584] ? __alloc_pages_slowpath+0x2930/0x2930 [ 377.679732] ? lock_downgrade+0x6e0/0x6e0 [ 377.679756] alloc_pages_current+0xec/0x1e0 [ 377.679771] __page_cache_alloc+0x248/0x3e0 [ 377.679785] do_read_cache_page+0x625/0xfc0 [ 377.679793] ? blkdev_writepages+0xd0/0xd0 [ 377.679806] ? find_get_pages_contig+0xaa0/0xaa0 [ 377.719615] ? blkdev_get+0xb0/0x8e0 [ 377.723346] ? dput.part.0+0x170/0x750 [ 377.727249] ? bd_may_claim+0xd0/0xd0 [ 377.731163] ? path_put+0x50/0x70 [ 377.734618] ? lookup_bdev.part.0+0xe1/0x160 [ 377.739044] read_cache_page_gfp+0x6e/0x90 [ 377.743295] btrfs_read_disk_super+0xdd/0x440 [ 377.748096] btrfs_scan_one_device+0xc6/0x400 [ 377.752606] ? device_list_add+0x8d0/0x8d0 [ 377.756848] ? __free_pages+0x54/0x90 [ 377.760663] ? free_pages+0x46/0x50 [ 377.764301] btrfs_mount+0x2e3/0x2b28 [ 377.768114] ? lock_downgrade+0x6e0/0x6e0 [ 377.772621] ? find_held_lock+0x35/0x130 [ 377.776692] ? pcpu_alloc+0x3af/0x1050 [ 377.780598] ? btrfs_remount+0x11f0/0x11f0 [ 377.784850] ? rcu_read_lock_sched_held+0x110/0x130 [ 377.789897] ? __lockdep_init_map+0x10c/0x570 [ 377.794412] mount_fs+0x97/0x2a1 [ 377.797790] vfs_kern_mount.part.0+0x5e/0x3d0 [ 377.802388] ? find_held_lock+0x35/0x130 [ 377.806460] vfs_kern_mount+0x40/0x60 [ 377.810276] btrfs_mount+0x3ce/0x2b28 [ 377.814081] ? lock_downgrade+0x6e0/0x6e0 [ 377.818232] ? find_held_lock+0x35/0x130 [ 377.822297] ? pcpu_alloc+0x3af/0x1050 [ 377.826209] ? btrfs_remount+0x11f0/0x11f0 [ 377.830816] ? rcu_read_lock_sched_held+0x110/0x130 [ 377.835854] ? __lockdep_init_map+0x10c/0x570 [ 377.840715] ? __lockdep_init_map+0x10c/0x570 [ 377.845236] mount_fs+0x97/0x2a1 [ 377.848610] vfs_kern_mount.part.0+0x5e/0x3d0 [ 377.853111] do_mount+0x417/0x27d0 [ 377.857833] ? copy_mount_options+0x5c/0x2f0 [ 377.862335] ? rcu_read_lock_sched_held+0x110/0x130 [ 377.867337] ? copy_mount_string+0x40/0x40 [ 377.871573] ? copy_mount_options+0x1fe/0x2f0 [ 377.876069] SyS_mount+0xab/0x120 [ 377.879628] ? copy_mnt_ns+0x8c0/0x8c0 [ 377.883535] do_syscall_64+0x1e8/0x640 [ 377.887412] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 377.892347] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 377.897555] RIP: 0033:0x45c2ca [ 377.900739] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 377.908548] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 377.915900] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 377.923167] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 377.930561] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 377.937879] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = signalfd4(r0, &(0x7f0000000000)={0x200}, 0x8, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f00000001c0)={0x1, 0x70, "72d06a068569188ec3ab2efac2f0cc2b74a82e31ecab4e506eb580cdbf5883386e4350a34f3c9c9e7836eddd2375c52508eaa7237671294411212aa30d009b7a8108061222944e4df5501823f23d235d106769cc7c744a615d79eb3c437ebbc0fb8cae2dbb62065a58d0e4ca899ed32e"}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, 0x0, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 15:18:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:23 executing program 3 (fault-call:2 fault-nth:68): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 378.125394] FAULT_INJECTION: forcing a failure. [ 378.125394] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 378.137261] CPU: 1 PID: 21331 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 378.137269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.137273] Call Trace: [ 378.137293] dump_stack+0x138/0x197 [ 378.137314] should_fail.cold+0x10f/0x159 [ 378.154040] __alloc_pages_nodemask+0x1d6/0x7a0 [ 378.154054] ? __alloc_pages_slowpath+0x2930/0x2930 [ 378.154075] cache_grow_begin+0x80/0x400 [ 378.169936] kmem_cache_alloc+0x6a6/0x780 [ 378.169951] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 378.169964] getname_kernel+0x53/0x350 [ 378.179030] kern_path+0x20/0x40 [ 378.179043] lookup_bdev.part.0+0x63/0x160 [ 378.179052] ? blkdev_open+0x260/0x260 [ 378.179066] ? free_hot_cold_page+0x763/0xca0 [ 378.179077] blkdev_get_by_path+0x76/0xf0 [ 378.208185] btrfs_scan_one_device+0x97/0x400 [ 378.208200] ? device_list_add+0x8d0/0x8d0 [ 378.208212] ? __free_pages+0x54/0x90 [ 378.208224] ? free_pages+0x46/0x50 [ 378.217143] btrfs_mount+0x2e3/0x2b28 [ 378.217157] ? lock_downgrade+0x6e0/0x6e0 [ 378.217166] ? find_held_lock+0x35/0x130 [ 378.217175] ? pcpu_alloc+0x3af/0x1050 [ 378.217190] ? btrfs_remount+0x11f0/0x11f0 [ 378.228833] ? rcu_read_lock_sched_held+0x110/0x130 [ 378.228856] ? __lockdep_init_map+0x10c/0x570 [ 378.228873] mount_fs+0x97/0x2a1 [ 378.228887] vfs_kern_mount.part.0+0x5e/0x3d0 [ 378.236944] ? find_held_lock+0x35/0x130 [ 378.236962] vfs_kern_mount+0x40/0x60 [ 378.236976] btrfs_mount+0x3ce/0x2b28 [ 378.236988] ? lock_downgrade+0x6e0/0x6e0 [ 378.282760] ? find_held_lock+0x35/0x130 [ 378.286829] ? pcpu_alloc+0x3af/0x1050 [ 378.290806] ? btrfs_remount+0x11f0/0x11f0 [ 378.295127] ? rcu_read_lock_sched_held+0x110/0x130 [ 378.300334] ? __lockdep_init_map+0x10c/0x570 [ 378.304817] ? __lockdep_init_map+0x10c/0x570 [ 378.309701] mount_fs+0x97/0x2a1 [ 378.313150] vfs_kern_mount.part.0+0x5e/0x3d0 [ 378.317750] do_mount+0x417/0x27d0 [ 378.321355] ? copy_mount_options+0x5c/0x2f0 [ 378.325779] ? rcu_read_lock_sched_held+0x110/0x130 [ 378.331430] ? copy_mount_string+0x40/0x40 [ 378.335789] ? copy_mount_options+0x1fe/0x2f0 [ 378.340584] SyS_mount+0xab/0x120 [ 378.344161] ? copy_mnt_ns+0x8c0/0x8c0 [ 378.348042] do_syscall_64+0x1e8/0x640 [ 378.351936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.356787] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 378.362403] RIP: 0033:0x45c2ca [ 378.365591] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 15:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000040)=0x100000000) getsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f00000000c0)=""/6, &(0x7f0000000140)=0x6) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000240)=ANY=[@ANYBLOB="290000007f00000009000000000000000300000000000000a00e0000000000000600000000000000030000000000000008200000000000000200000000000000020000000000000000000080000000000010000000000000ffffffff00000000070000000000000008000000000000000600000000000000020000000000000000000000000000000000f9ffffffffffffff"]) ioctl(r0, 0x1100008912, &(0x7f0000000180)="1187dfaead82577aa0f070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 378.373307] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 378.380617] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 378.392089] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 378.399393] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 378.406940] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 15:18:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffff80000000, 0x5c9001) write$P9_RCLUNK(r3, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000001c0)) 15:18:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, 0x0, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:23 executing program 3 (fault-call:2 fault-nth:69): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 15:18:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f0000000300)={0x8000, 0x80, 0x53, 'queue1\x00', 0x1ff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 378.784184] FAULT_INJECTION: forcing a failure. [ 378.784184] name failslab, interval 1, probability 0, space 0, times 0 [ 378.836168] CPU: 1 PID: 21379 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 378.843399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.853279] Call Trace: [ 378.853297] dump_stack+0x138/0x197 [ 378.853316] should_fail.cold+0x10f/0x159 [ 378.853334] should_failslab+0xdb/0x130 [ 378.859541] kmem_cache_alloc+0x2d7/0x780 [ 378.872468] ? delete_node+0x1fb/0x690 [ 378.876371] ? save_trace+0x290/0x290 [ 378.880977] alloc_buffer_head+0x24/0xe0 [ 378.885052] alloc_page_buffers+0xb7/0x200 [ 378.889315] create_empty_buffers+0x39/0x480 [ 378.893754] ? __lock_is_held+0xb6/0x140 [ 378.897949] ? check_preemption_disabled+0x3c/0x250 [ 378.903077] create_page_buffers+0x153/0x1c0 [ 378.907513] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 378.913191] block_read_full_page+0xcd/0x960 [ 378.917849] ? set_init_blocksize+0x220/0x220 [ 378.922327] ? __lru_cache_add+0x18a/0x250 [ 378.926549] ? __bread_gfp+0x290/0x290 [ 378.930543] ? add_to_page_cache_lru+0x159/0x310 [ 378.935340] ? add_to_page_cache_locked+0x40/0x40 [ 378.940351] blkdev_readpage+0x1d/0x30 [ 378.944257] do_read_cache_page+0x671/0xfc0 [ 378.948604] ? blkdev_writepages+0xd0/0xd0 [ 378.952835] ? find_get_pages_contig+0xaa0/0xaa0 [ 378.957584] ? blkdev_get+0xb0/0x8e0 [ 378.961397] ? dput.part.0+0x170/0x750 [ 378.965299] ? bd_may_claim+0xd0/0xd0 [ 378.969096] ? path_put+0x50/0x70 [ 378.972560] ? lookup_bdev.part.0+0xe1/0x160 [ 378.977073] read_cache_page_gfp+0x6e/0x90 [ 378.981392] btrfs_read_disk_super+0xdd/0x440 [ 378.986000] btrfs_scan_one_device+0xc6/0x400 [ 378.990527] ? device_list_add+0x8d0/0x8d0 [ 378.994790] ? __free_pages+0x54/0x90 [ 378.998590] ? free_pages+0x46/0x50 [ 379.002223] btrfs_mount+0x2e3/0x2b28 [ 379.006015] ? lock_downgrade+0x6e0/0x6e0 [ 379.010529] ? find_held_lock+0x35/0x130 [ 379.015199] ? pcpu_alloc+0x3af/0x1050 [ 379.019083] ? btrfs_remount+0x11f0/0x11f0 [ 379.023315] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.028350] ? __lockdep_init_map+0x10c/0x570 [ 379.032868] mount_fs+0x97/0x2a1 [ 379.036288] vfs_kern_mount.part.0+0x5e/0x3d0 [ 379.040789] ? find_held_lock+0x35/0x130 [ 379.044937] vfs_kern_mount+0x40/0x60 [ 379.048735] btrfs_mount+0x3ce/0x2b28 [ 379.052541] ? lock_downgrade+0x6e0/0x6e0 [ 379.056690] ? find_held_lock+0x35/0x130 [ 379.060740] ? pcpu_alloc+0x3af/0x1050 [ 379.064880] ? btrfs_remount+0x11f0/0x11f0 [ 379.069319] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.074343] ? __lockdep_init_map+0x10c/0x570 [ 379.078833] ? __lockdep_init_map+0x10c/0x570 [ 379.083328] mount_fs+0x97/0x2a1 [ 379.086722] vfs_kern_mount.part.0+0x5e/0x3d0 [ 379.091233] do_mount+0x417/0x27d0 [ 379.094843] ? copy_mount_options+0x5c/0x2f0 [ 379.099360] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.104378] ? copy_mount_string+0x40/0x40 [ 379.108615] ? copy_mount_options+0x1fe/0x2f0 [ 379.113103] SyS_mount+0xab/0x120 [ 379.116547] ? copy_mnt_ns+0x8c0/0x8c0 [ 379.120700] do_syscall_64+0x1e8/0x640 [ 379.125485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.130338] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 379.135520] RIP: 0033:0x45c2ca [ 379.138693] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.146546] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 379.153897] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 379.161169] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 379.168430] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 379.175689] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000001c0)='/dev/loop#\x00'}, 0x30) fcntl$getownex(r0, 0x10, &(0x7f0000000280)) fcntl$getown(r0, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r2 = syz_open_pts(0xffffffffffffffff, 0x101440) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 379.220419] print_req_error: I/O error, dev loop2, sector 128 15:18:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 15:18:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0), 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 15:18:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:24 executing program 3 (fault-call:2 fault-nth:70): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x98, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0xf94, @dev={0xfe, 0x80, [], 0x12}, 0x80}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e20, 0x8000, @empty, 0xfffffffffffffffc}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f00000001c0)=0x10) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x6, 0x200002) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0x8, 0xfffffffffffffffb, 0x2}, 0x10) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$KDMKTONE(r1, 0x4b30, 0x7fe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r2, 0x8}, &(0x7f00000001c0)=0x8) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0xaaaaaaaaaaaa6e7, &(0x7f0000000080), 0x100, 0x0) [ 379.560647] print_req_error: I/O error, dev loop2, sector 128 [ 379.571920] FAULT_INJECTION: forcing a failure. [ 379.571920] name failslab, interval 1, probability 0, space 0, times 0 [ 379.591899] CPU: 1 PID: 21433 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 379.599068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.608436] Call Trace: [ 379.611029] dump_stack+0x138/0x197 [ 379.614656] should_fail.cold+0x10f/0x159 [ 379.619328] should_failslab+0xdb/0x130 [ 379.623306] kmem_cache_alloc_node_trace+0x280/0x770 [ 379.628405] ? mutex_unlock+0xd/0x10 [ 379.632191] ? btrfs_scan_one_device+0xeb/0x400 [ 379.636850] __kmalloc_node+0x3d/0x80 [ 379.640651] kvmalloc_node+0x93/0xe0 [ 379.644358] btrfs_mount+0xf88/0x2b28 [ 379.648163] ? lock_downgrade+0x6e0/0x6e0 [ 379.652294] ? find_held_lock+0x35/0x130 [ 379.656446] ? pcpu_alloc+0x3af/0x1050 [ 379.660774] ? btrfs_remount+0x11f0/0x11f0 [ 379.664997] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.670005] ? __lockdep_init_map+0x10c/0x570 [ 379.674501] mount_fs+0x97/0x2a1 [ 379.677855] vfs_kern_mount.part.0+0x5e/0x3d0 [ 379.682338] ? find_held_lock+0x35/0x130 [ 379.686388] vfs_kern_mount+0x40/0x60 [ 379.690179] btrfs_mount+0x3ce/0x2b28 [ 379.693967] ? lock_downgrade+0x6e0/0x6e0 [ 379.698129] ? find_held_lock+0x35/0x130 [ 379.702189] ? pcpu_alloc+0x3af/0x1050 [ 379.706072] ? btrfs_remount+0x11f0/0x11f0 [ 379.710337] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.715350] ? __lockdep_init_map+0x10c/0x570 [ 379.719920] ? __lockdep_init_map+0x10c/0x570 [ 379.724580] mount_fs+0x97/0x2a1 [ 379.727935] vfs_kern_mount.part.0+0x5e/0x3d0 [ 379.732433] do_mount+0x417/0x27d0 [ 379.735958] ? copy_mount_options+0x5c/0x2f0 [ 379.740352] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.745377] ? copy_mount_string+0x40/0x40 [ 379.749601] ? copy_mount_options+0x1fe/0x2f0 [ 379.754092] SyS_mount+0xab/0x120 [ 379.757534] ? copy_mnt_ns+0x8c0/0x8c0 [ 379.761670] do_syscall_64+0x1e8/0x640 [ 379.765554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.770735] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 379.775950] RIP: 0033:0x45c2ca [ 379.779137] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.786832] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 379.794624] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 379.801908] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 15:18:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) [ 379.809163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 379.816422] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x3) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x42000, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x322) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000300)={{0x200, 0x6, 0x80000000, 0xfffffffffffffffd, 0x5, 0x800}, 0x6}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0), 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 15:18:25 executing program 3 (fault-call:2 fault-nth:71): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 380.079766] FAULT_INJECTION: forcing a failure. [ 380.079766] name failslab, interval 1, probability 0, space 0, times 0 [ 380.116267] CPU: 1 PID: 21484 Comm: syz-executor.3 Not tainted 4.14.141 #37 15:18:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x5, 0x0, 0x9, 0x8, 0x0, 0x7, 0x1000, 0x702fb69fc42e6603, 0x10000, 0x0, 0x7, 0x0, 0x20000000000, 0x80000000, 0x40, 0x8001, 0x80, 0x1f3a, 0x5318, 0xa2c5, 0xeaa, 0x1, 0x4, 0x0, 0x6b9, 0x400, 0x8, 0x8000, 0x2, 0x5, 0x22c6, 0xff, 0x7fff, 0x0, 0xffffffff, 0x80000001, 0x0, 0xdd65, 0x6, @perf_config_ext={0x8000, 0x1}, 0x80, 0x75f, 0x5ef3e5d1, 0x2, 0xffff, 0x9, 0x2bc}) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0xa4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000080)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 380.123424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.132790] Call Trace: [ 380.135396] dump_stack+0x138/0x197 [ 380.139051] should_fail.cold+0x10f/0x159 [ 380.143223] should_failslab+0xdb/0x130 [ 380.147214] kmem_cache_alloc_node+0x56/0x780 [ 380.151721] ? mount_fs+0x97/0x2a1 [ 380.155369] create_task_io_context+0x31/0x3d0 [ 380.159977] generic_make_request_checks+0x1505/0x1ac0 [ 380.166227] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.171257] ? blk_cleanup_queue+0x610/0x610 [ 380.175682] ? trace_hardirqs_on+0x10/0x10 [ 380.179935] generic_make_request+0x7d/0xa40 [ 380.184360] ? save_trace+0x290/0x290 [ 380.188225] ? blk_queue_enter+0x520/0x520 [ 380.192458] ? find_held_lock+0x35/0x130 [ 380.196541] ? guard_bio_eod+0x161/0x530 [ 380.200612] submit_bio+0x1a5/0x3f0 [ 380.204230] ? submit_bio+0x1a5/0x3f0 [ 380.208016] ? generic_make_request+0xa40/0xa40 [ 380.212685] ? guard_bio_eod+0x1fd/0x530 [ 380.216748] submit_bh_wbc+0x550/0x720 [ 380.221210] block_read_full_page+0x7a2/0x960 [ 380.225732] ? set_init_blocksize+0x220/0x220 [ 380.230331] ? __bread_gfp+0x290/0x290 [ 380.234316] ? add_to_page_cache_lru+0x159/0x310 [ 380.239067] ? add_to_page_cache_locked+0x40/0x40 [ 380.244442] blkdev_readpage+0x1d/0x30 [ 380.248338] do_read_cache_page+0x671/0xfc0 [ 380.252672] ? blkdev_writepages+0xd0/0xd0 [ 380.256928] ? find_get_pages_contig+0xaa0/0xaa0 [ 380.261689] ? blkdev_get+0xb0/0x8e0 [ 380.265539] ? dput.part.0+0x170/0x750 [ 380.269523] ? bd_may_claim+0xd0/0xd0 [ 380.273498] ? path_put+0x50/0x70 [ 380.276943] ? lookup_bdev.part.0+0xe1/0x160 [ 380.281360] read_cache_page_gfp+0x6e/0x90 [ 380.285612] btrfs_read_disk_super+0xdd/0x440 [ 380.290191] btrfs_scan_one_device+0xc6/0x400 [ 380.294793] ? device_list_add+0x8d0/0x8d0 [ 380.299069] ? __free_pages+0x54/0x90 [ 380.302890] ? free_pages+0x46/0x50 [ 380.306516] btrfs_mount+0x2e3/0x2b28 [ 380.310423] ? lock_downgrade+0x6e0/0x6e0 [ 380.314568] ? find_held_lock+0x35/0x130 [ 380.318718] ? pcpu_alloc+0x3af/0x1050 [ 380.322614] ? btrfs_remount+0x11f0/0x11f0 [ 380.326850] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.331877] ? __lockdep_init_map+0x10c/0x570 [ 380.336398] mount_fs+0x97/0x2a1 [ 380.339792] vfs_kern_mount.part.0+0x5e/0x3d0 [ 380.344429] ? find_held_lock+0x35/0x130 [ 380.348591] vfs_kern_mount+0x40/0x60 [ 380.352399] btrfs_mount+0x3ce/0x2b28 [ 380.356187] ? lock_downgrade+0x6e0/0x6e0 [ 380.360485] ? find_held_lock+0x35/0x130 [ 380.364803] ? pcpu_alloc+0x3af/0x1050 [ 380.368689] ? btrfs_remount+0x11f0/0x11f0 [ 380.373305] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.378649] ? __lockdep_init_map+0x10c/0x570 [ 380.383173] ? __lockdep_init_map+0x10c/0x570 [ 380.387668] mount_fs+0x97/0x2a1 [ 380.391049] vfs_kern_mount.part.0+0x5e/0x3d0 [ 380.395562] do_mount+0x417/0x27d0 [ 380.399972] ? copy_mount_options+0x5c/0x2f0 [ 380.404382] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.409478] ? copy_mount_string+0x40/0x40 [ 380.413707] ? copy_mount_options+0x1fe/0x2f0 [ 380.418222] SyS_mount+0xab/0x120 [ 380.421861] ? copy_mnt_ns+0x8c0/0x8c0 [ 380.426703] do_syscall_64+0x1e8/0x640 [ 380.430579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.435414] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 380.440590] RIP: 0033:0x45c2ca [ 380.443767] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 380.451485] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 380.458774] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 380.466125] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 380.473407] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 15:18:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 15:18:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 380.480760] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0), 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000000)=0x8) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 380.544107] print_req_error: I/O error, dev loop1, sector 128 15:18:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 15:18:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 380.621226] print_req_error: I/O error, dev loop2, sector 128 15:18:25 executing program 3 (fault-call:2 fault-nth:72): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x10002) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/119) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 15:18:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 380.892985] FAULT_INJECTION: forcing a failure. [ 380.892985] name failslab, interval 1, probability 0, space 0, times 0 15:18:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0xffffffffffffff57, 0x1081807) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 380.950005] CPU: 1 PID: 21541 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 380.957259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.966720] Call Trace: [ 380.969351] dump_stack+0x138/0x197 [ 380.973129] should_fail.cold+0x10f/0x159 [ 380.977300] ? __lock_is_held+0xb6/0x140 [ 380.981403] ? mempool_free+0x1d0/0x1d0 [ 380.985484] should_failslab+0xdb/0x130 [ 380.989473] kmem_cache_alloc+0x47/0x780 [ 380.993636] ? mempool_free+0x1d0/0x1d0 [ 380.997622] mempool_alloc_slab+0x47/0x60 [ 381.001779] mempool_alloc+0x138/0x300 [ 381.005678] ? remove_element.isra.0+0x1b0/0x1b0 [ 381.010456] ? find_held_lock+0x35/0x130 [ 381.014536] ? create_empty_buffers+0x2d3/0x480 [ 381.019218] ? save_trace+0x290/0x290 [ 381.023116] bio_alloc_bioset+0x368/0x680 [ 381.027374] ? bvec_alloc+0x2e0/0x2e0 [ 381.031191] submit_bh_wbc+0xf6/0x720 [ 381.035011] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 381.040500] block_read_full_page+0x7a2/0x960 [ 381.040514] ? set_init_blocksize+0x220/0x220 [ 381.040529] ? __bread_gfp+0x290/0x290 [ 381.040542] ? add_to_page_cache_lru+0x159/0x310 [ 381.040554] ? add_to_page_cache_locked+0x40/0x40 [ 381.040565] blkdev_readpage+0x1d/0x30 [ 381.040572] do_read_cache_page+0x671/0xfc0 [ 381.040580] ? blkdev_writepages+0xd0/0xd0 [ 381.040593] ? find_get_pages_contig+0xaa0/0xaa0 [ 381.040601] ? blkdev_get+0xb0/0x8e0 [ 381.040610] ? dput.part.0+0x170/0x750 [ 381.040620] ? bd_may_claim+0xd0/0xd0 [ 381.049607] ? path_put+0x50/0x70 [ 381.049620] ? lookup_bdev.part.0+0xe1/0x160 [ 381.049634] read_cache_page_gfp+0x6e/0x90 [ 381.049648] btrfs_read_disk_super+0xdd/0x440 [ 381.049662] btrfs_scan_one_device+0xc6/0x400 [ 381.049675] ? device_list_add+0x8d0/0x8d0 [ 381.049684] ? __free_pages+0x54/0x90 [ 381.049695] ? free_pages+0x46/0x50 [ 381.126053] btrfs_mount+0x2e3/0x2b28 [ 381.129853] ? lock_downgrade+0x6e0/0x6e0 [ 381.134165] ? find_held_lock+0x35/0x130 [ 381.138250] ? pcpu_alloc+0x3af/0x1050 [ 381.142163] ? btrfs_remount+0x11f0/0x11f0 [ 381.146416] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.151615] ? __lockdep_init_map+0x10c/0x570 [ 381.156196] mount_fs+0x97/0x2a1 [ 381.159573] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.164086] ? find_held_lock+0x35/0x130 [ 381.168165] vfs_kern_mount+0x40/0x60 [ 381.171970] btrfs_mount+0x3ce/0x2b28 [ 381.175772] ? lock_downgrade+0x6e0/0x6e0 [ 381.179933] ? find_held_lock+0x35/0x130 [ 381.184024] ? pcpu_alloc+0x3af/0x1050 [ 381.187941] ? btrfs_remount+0x11f0/0x11f0 [ 381.192181] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.197196] ? __lockdep_init_map+0x10c/0x570 [ 381.201717] ? __lockdep_init_map+0x10c/0x570 [ 381.206228] mount_fs+0x97/0x2a1 [ 381.209610] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.214125] do_mount+0x417/0x27d0 [ 381.218039] ? copy_mount_options+0x5c/0x2f0 [ 381.222440] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.227479] ? copy_mount_string+0x40/0x40 [ 381.231742] ? copy_mount_options+0x1fe/0x2f0 [ 381.236238] SyS_mount+0xab/0x120 [ 381.239709] ? copy_mnt_ns+0x8c0/0x8c0 [ 381.247392] do_syscall_64+0x1e8/0x640 [ 381.251303] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.256151] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 381.261336] RIP: 0033:0x45c2ca [ 381.265510] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 381.273210] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 381.280494] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 381.287789] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 381.295075] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 381.302344] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = dup3(r1, r0, 0x80000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x9c, r4, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1f}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="9d698cdeb07979b4b584cd67371a6f10"}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x240}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10000000000}]}]}, 0x9c}}, 0x800) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 15:18:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:26 executing program 3 (fault-call:2 fault-nth:73): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 15:18:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(r0, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(r0, 0x0, 0x10123) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) r2 = getpgid(0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) setpgid(r2, r3) getegid() 15:18:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 381.670858] print_req_error: I/O error, dev loop2, sector 128 15:18:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 381.728099] FAULT_INJECTION: forcing a failure. [ 381.728099] name failslab, interval 1, probability 0, space 0, times 0 15:18:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xc29b83d9af4c8d74, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000080)={0x20, 0x3, 0xffffffffffff5eb8, 0x1, 0x8000}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() socket$inet_udplite(0x2, 0x2, 0x88) [ 381.776070] CPU: 1 PID: 21606 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 381.783215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.792669] Call Trace: [ 381.795272] dump_stack+0x138/0x197 [ 381.798906] should_fail.cold+0x10f/0x159 [ 381.798925] should_failslab+0xdb/0x130 [ 381.798941] kmem_cache_alloc+0x2d7/0x780 [ 381.798950] ? save_stack_trace+0x16/0x20 [ 381.798960] ? save_stack+0x45/0xd0 [ 381.807243] ? kasan_kmalloc+0xce/0xf0 [ 381.807255] ? kmem_cache_alloc_trace+0x152/0x790 [ 381.807266] ? btrfs_mount+0x1069/0x2b28 [ 381.807275] ? mount_fs+0x97/0x2a1 [ 381.807289] getname_kernel+0x53/0x350 [ 381.807301] kern_path+0x20/0x40 [ 381.832080] lookup_bdev.part.0+0x63/0x160 [ 381.832090] ? blkdev_open+0x260/0x260 [ 381.832103] ? btrfs_open_devices+0x27/0xb0 [ 381.832116] blkdev_get_by_path+0x76/0xf0 [ 381.832125] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 381.832137] __btrfs_open_devices+0x194/0xab0 [ 381.832147] ? check_preemption_disabled+0x3c/0x250 [ 381.832160] ? find_device+0x100/0x100 [ 381.839688] ? btrfs_mount+0x1069/0x2b28 [ 381.839703] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.839720] btrfs_open_devices+0xa4/0xb0 [ 381.839732] btrfs_mount+0x11b4/0x2b28 [ 381.839742] ? lock_downgrade+0x6e0/0x6e0 [ 381.839753] ? find_held_lock+0x35/0x130 [ 381.902956] ? pcpu_alloc+0x3af/0x1050 [ 381.906834] ? btrfs_remount+0x11f0/0x11f0 [ 381.911184] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.916231] ? __lockdep_init_map+0x10c/0x570 [ 381.916253] mount_fs+0x97/0x2a1 [ 381.916269] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.916277] ? find_held_lock+0x35/0x130 [ 381.916292] vfs_kern_mount+0x40/0x60 [ 381.924222] btrfs_mount+0x3ce/0x2b28 [ 381.924234] ? lock_downgrade+0x6e0/0x6e0 [ 381.924244] ? find_held_lock+0x35/0x130 [ 381.924254] ? pcpu_alloc+0x3af/0x1050 [ 381.924271] ? btrfs_remount+0x11f0/0x11f0 [ 381.924286] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.924303] ? __lockdep_init_map+0x10c/0x570 [ 381.966192] ? __lockdep_init_map+0x10c/0x570 [ 381.970678] mount_fs+0x97/0x2a1 [ 381.974038] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.978537] do_mount+0x417/0x27d0 [ 381.982075] ? copy_mount_options+0x5c/0x2f0 [ 381.986499] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.991507] ? copy_mount_string+0x40/0x40 [ 381.995758] ? copy_mount_options+0x1fe/0x2f0 [ 382.000246] SyS_mount+0xab/0x120 [ 382.003686] ? copy_mnt_ns+0x8c0/0x8c0 [ 382.007581] do_syscall_64+0x1e8/0x640 [ 382.011460] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.016321] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 382.021526] RIP: 0033:0x45c2ca [ 382.024719] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 382.032432] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 382.039721] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 382.046995] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 382.054282] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 382.061539] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 15:18:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) getpgrp(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x1, 0x3, 0x0, 0x0, 0x40000000000, 0x100, "a431c2a4cdb9795b06f93c44aefdc4ebf9c5db49fd9e2cfaaa63c88dddde91314c0d0c29cae24a6d21bdd9913e2f2b6f447da7afba00", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84", [0x0, 0x3d]}) getegid() 15:18:27 executing program 3 (fault-call:2 fault-nth:74): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(0x0, 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 382.316236] print_req_error: I/O error, dev loop1, sector 128 15:18:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x110000890f, &(0x7f00000001c0)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 382.430249] FAULT_INJECTION: forcing a failure. [ 382.430249] name failslab, interval 1, probability 0, space 0, times 0 [ 382.526579] CPU: 1 PID: 21673 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 382.533737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.543100] Call Trace: [ 382.545699] dump_stack+0x138/0x197 [ 382.549325] should_fail.cold+0x10f/0x159 [ 382.553475] should_failslab+0xdb/0x130 [ 382.557450] kmem_cache_alloc_node_trace+0x280/0x770 [ 382.562560] ? mutex_unlock+0xd/0x10 [ 382.566441] ? btrfs_scan_one_device+0xeb/0x400 [ 382.571198] __kmalloc_node+0x3d/0x80 [ 382.574991] kvmalloc_node+0x93/0xe0 [ 382.578719] btrfs_mount+0xf88/0x2b28 [ 382.582535] ? lock_downgrade+0x6e0/0x6e0 [ 382.586776] ? find_held_lock+0x35/0x130 [ 382.590839] ? pcpu_alloc+0x3af/0x1050 [ 382.594732] ? btrfs_remount+0x11f0/0x11f0 [ 382.599067] ? rcu_read_lock_sched_held+0x110/0x130 [ 382.604086] ? __lockdep_init_map+0x10c/0x570 [ 382.608684] mount_fs+0x97/0x2a1 [ 382.612056] vfs_kern_mount.part.0+0x5e/0x3d0 [ 382.616540] ? find_held_lock+0x35/0x130 [ 382.620614] vfs_kern_mount+0x40/0x60 [ 382.624406] btrfs_mount+0x3ce/0x2b28 [ 382.628196] ? lock_downgrade+0x6e0/0x6e0 [ 382.632444] ? find_held_lock+0x35/0x130 [ 382.636518] ? pcpu_alloc+0x3af/0x1050 [ 382.640396] ? btrfs_remount+0x11f0/0x11f0 [ 382.644620] ? rcu_read_lock_sched_held+0x110/0x130 [ 382.649639] ? __lockdep_init_map+0x10c/0x570 [ 382.654155] ? __lockdep_init_map+0x10c/0x570 [ 382.658961] mount_fs+0x97/0x2a1 [ 382.662320] vfs_kern_mount.part.0+0x5e/0x3d0 [ 382.666800] do_mount+0x417/0x27d0 [ 382.670332] ? copy_mount_options+0x5c/0x2f0 [ 382.674752] ? rcu_read_lock_sched_held+0x110/0x130 [ 382.679783] ? copy_mount_string+0x40/0x40 [ 382.684449] ? copy_mount_options+0x1fe/0x2f0 [ 382.688941] SyS_mount+0xab/0x120 [ 382.692396] ? copy_mnt_ns+0x8c0/0x8c0 [ 382.696286] do_syscall_64+0x1e8/0x640 [ 382.700169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.705093] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 382.710290] RIP: 0033:0x45c2ca [ 382.713494] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 15:18:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 382.721186] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 382.728445] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 382.735708] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 382.742974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 382.750231] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 382.759797] print_req_error: I/O error, dev loop1, sector 128 15:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(0x0, 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x1, &(0x7f0000000080)=0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) setns(r1, 0x12000000) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) ptrace$cont(0x448c6fc447f9bed4, r2, 0x7, 0xfffffffffffffff7) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 15:18:28 executing program 3 (fault-call:2 fault-nth:75): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(0x0, 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 383.000618] loop_set_status: loop0 () has still dirty pages (nrpages=320) [ 383.017568] FAULT_INJECTION: forcing a failure. [ 383.017568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 383.029416] CPU: 1 PID: 21740 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 383.029424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.029428] Call Trace: [ 383.029447] dump_stack+0x138/0x197 [ 383.029464] should_fail.cold+0x10f/0x159 [ 383.029478] __alloc_pages_nodemask+0x1d6/0x7a0 [ 383.029490] ? __alloc_pages_slowpath+0x2930/0x2930 [ 383.029511] cache_grow_begin+0x80/0x400 [ 383.029525] kmem_cache_alloc+0x6a6/0x780 [ 383.029535] ? save_stack_trace+0x16/0x20 [ 383.029542] ? save_stack+0x45/0xd0 [ 383.029551] ? kmem_cache_alloc_trace+0x152/0x790 [ 383.029565] getname_kernel+0x53/0x350 [ 383.029574] kern_path+0x20/0x40 [ 383.029584] lookup_bdev.part.0+0x63/0x160 [ 383.029592] ? blkdev_open+0x260/0x260 [ 383.029602] ? btrfs_open_devices+0x27/0xb0 [ 383.029613] blkdev_get_by_path+0x76/0xf0 [ 383.029625] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 383.046099] __btrfs_open_devices+0x194/0xab0 [ 383.046114] ? check_preemption_disabled+0x3c/0x250 [ 383.046127] ? find_device+0x100/0x100 [ 383.046141] ? btrfs_mount+0x1069/0x2b28 [ 383.132392] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.137405] btrfs_open_devices+0xa4/0xb0 [ 383.141558] btrfs_mount+0x11b4/0x2b28 [ 383.145431] ? lock_downgrade+0x6e0/0x6e0 [ 383.149579] ? find_held_lock+0x35/0x130 [ 383.153622] ? pcpu_alloc+0x3af/0x1050 [ 383.157501] ? btrfs_remount+0x11f0/0x11f0 [ 383.161818] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.166825] ? __lockdep_init_map+0x10c/0x570 [ 383.171309] mount_fs+0x97/0x2a1 [ 383.174663] vfs_kern_mount.part.0+0x5e/0x3d0 [ 383.179224] ? find_held_lock+0x35/0x130 [ 383.183289] vfs_kern_mount+0x40/0x60 [ 383.187161] btrfs_mount+0x3ce/0x2b28 [ 383.190942] ? lock_downgrade+0x6e0/0x6e0 [ 383.195073] ? find_held_lock+0x35/0x130 [ 383.199115] ? pcpu_alloc+0x3af/0x1050 [ 383.203006] ? btrfs_remount+0x11f0/0x11f0 [ 383.207229] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.212237] ? __lockdep_init_map+0x10c/0x570 [ 383.216714] ? __lockdep_init_map+0x10c/0x570 [ 383.221195] mount_fs+0x97/0x2a1 [ 383.224554] vfs_kern_mount.part.0+0x5e/0x3d0 [ 383.229036] do_mount+0x417/0x27d0 [ 383.232563] ? copy_mount_options+0x5c/0x2f0 [ 383.236956] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.241979] ? copy_mount_string+0x40/0x40 [ 383.246224] ? copy_mount_options+0x1fe/0x2f0 [ 383.250706] SyS_mount+0xab/0x120 [ 383.254140] ? copy_mnt_ns+0x8c0/0x8c0 [ 383.258129] do_syscall_64+0x1e8/0x640 [ 383.261999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.266872] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.272045] RIP: 0033:0x45c2ca [ 383.275304] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 383.282996] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 383.290251] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 383.297504] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 383.308273] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 383.315630] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 15:18:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:28 executing program 3 (fault-call:2 fault-nth:76): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 383.603871] loop_set_status: loop0 () has still dirty pages (nrpages=320) [ 383.688704] FAULT_INJECTION: forcing a failure. [ 383.688704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 383.700548] CPU: 1 PID: 21785 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 383.707660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.717027] Call Trace: [ 383.719636] dump_stack+0x138/0x197 [ 383.723276] should_fail.cold+0x10f/0x159 [ 383.727438] __alloc_pages_nodemask+0x1d6/0x7a0 [ 383.732124] ? fs_reclaim_acquire+0x20/0x20 [ 383.736460] ? __alloc_pages_slowpath+0x2930/0x2930 [ 383.741500] cache_grow_begin+0x80/0x400 [ 383.745572] kmem_cache_alloc_trace+0x6b2/0x790 [ 383.750256] btrfs_mount+0x1001/0x2b28 [ 383.754155] ? lock_downgrade+0x6e0/0x6e0 [ 383.758308] ? find_held_lock+0x35/0x130 [ 383.762372] ? pcpu_alloc+0x3af/0x1050 [ 383.766324] ? btrfs_remount+0x11f0/0x11f0 [ 383.770578] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.775610] ? __lockdep_init_map+0x10c/0x570 [ 383.780122] mount_fs+0x97/0x2a1 [ 383.783500] vfs_kern_mount.part.0+0x5e/0x3d0 [ 383.788180] ? find_held_lock+0x35/0x130 [ 383.792252] vfs_kern_mount+0x40/0x60 [ 383.796063] btrfs_mount+0x3ce/0x2b28 [ 383.799951] ? lock_downgrade+0x6e0/0x6e0 [ 383.804365] ? find_held_lock+0x35/0x130 [ 383.808431] ? pcpu_alloc+0x3af/0x1050 [ 383.812323] ? btrfs_remount+0x11f0/0x11f0 [ 383.816557] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.821584] ? __lockdep_init_map+0x10c/0x570 [ 383.821595] ? __lockdep_init_map+0x10c/0x570 [ 383.821609] mount_fs+0x97/0x2a1 [ 383.821622] vfs_kern_mount.part.0+0x5e/0x3d0 [ 383.830622] do_mount+0x417/0x27d0 [ 383.830637] ? copy_mount_string+0x40/0x40 [ 383.830644] ? copy_mount_options+0x151/0x2f0 [ 383.830655] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 383.830666] ? copy_mount_options+0x1fe/0x2f0 [ 383.830679] SyS_mount+0xab/0x120 [ 383.864558] ? copy_mnt_ns+0x8c0/0x8c0 [ 383.868433] do_syscall_64+0x1e8/0x640 [ 383.872306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.877137] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.882326] RIP: 0033:0x45c2ca 15:18:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10b000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x100, 0x3}, &(0x7f0000000080)=0x90) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000001c0)={r2, 0x3ff}, 0x8) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 383.885498] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 383.893206] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 383.900476] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 383.907753] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 383.915032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 383.922384] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 15:18:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 384.041815] print_req_error: I/O error, dev loop1, sector 128 15:18:29 executing program 3 (fault-call:2 fault-nth:77): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 384.184299] FAULT_INJECTION: forcing a failure. [ 384.184299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.197294] CPU: 0 PID: 21829 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 384.204401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.213763] Call Trace: [ 384.216372] dump_stack+0x138/0x197 [ 384.220015] should_fail.cold+0x10f/0x159 [ 384.224171] __alloc_pages_nodemask+0x1d6/0x7a0 [ 384.228851] ? fs_reclaim_acquire+0x20/0x20 [ 384.233181] ? __alloc_pages_slowpath+0x2930/0x2930 [ 384.238218] cache_grow_begin+0x80/0x400 [ 384.242302] kmem_cache_alloc_trace+0x6b2/0x790 [ 384.247079] btrfs_mount+0x1001/0x2b28 [ 384.251100] ? lock_downgrade+0x6e0/0x6e0 [ 384.255260] ? find_held_lock+0x35/0x130 [ 384.259337] ? pcpu_alloc+0x3af/0x1050 [ 384.263248] ? btrfs_remount+0x11f0/0x11f0 [ 384.267510] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.272546] ? __lockdep_init_map+0x10c/0x570 [ 384.277069] mount_fs+0x97/0x2a1 [ 384.280450] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.284951] ? find_held_lock+0x35/0x130 [ 384.289024] vfs_kern_mount+0x40/0x60 [ 384.292834] btrfs_mount+0x3ce/0x2b28 [ 384.296903] ? lock_downgrade+0x6e0/0x6e0 [ 384.301061] ? find_held_lock+0x35/0x130 [ 384.305129] ? pcpu_alloc+0x3af/0x1050 [ 384.309030] ? btrfs_remount+0x11f0/0x11f0 [ 384.313495] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.318556] ? __lockdep_init_map+0x10c/0x570 [ 384.323057] ? __lockdep_init_map+0x10c/0x570 [ 384.323072] mount_fs+0x97/0x2a1 [ 384.323087] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.323101] do_mount+0x417/0x27d0 [ 384.323110] ? copy_mount_options+0x5c/0x2f0 [ 384.323119] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.323131] ? copy_mount_string+0x40/0x40 [ 384.323144] ? copy_mount_options+0x1fe/0x2f0 [ 384.323156] SyS_mount+0xab/0x120 [ 384.323163] ? copy_mnt_ns+0x8c0/0x8c0 [ 384.323176] do_syscall_64+0x1e8/0x640 [ 384.335498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.335518] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.335530] RIP: 0033:0x45c2ca 15:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 384.382130] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.389852] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 384.389859] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 384.389865] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 384.389870] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 384.389876] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(r0, 0xfffffffffffffdfe, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 384.462488] print_req_error: I/O error, dev loop1, sector 128 15:18:29 executing program 3 (fault-call:2 fault-nth:78): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 384.632999] FAULT_INJECTION: forcing a failure. [ 384.632999] name failslab, interval 1, probability 0, space 0, times 0 [ 384.646958] CPU: 0 PID: 21874 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 384.654083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.663439] Call Trace: [ 384.666032] dump_stack+0x138/0x197 [ 384.669672] should_fail.cold+0x10f/0x159 [ 384.673839] should_failslab+0xdb/0x130 [ 384.677824] kmem_cache_alloc+0x2d7/0x780 [ 384.681979] ? add_to_page_cache_lru+0x159/0x310 [ 384.686748] ? add_to_page_cache_locked+0x40/0x40 [ 384.691602] alloc_buffer_head+0x24/0xe0 [ 384.695669] alloc_page_buffers+0xb7/0x200 [ 384.699920] __getblk_gfp+0x342/0x710 [ 384.703726] ? retint_kernel+0x2d/0x2d [ 384.707619] ? lru_add_drain_all+0x18/0x20 [ 384.707639] __bread_gfp+0x2e/0x290 [ 384.707653] btrfs_read_dev_one_super+0x9f/0x270 [ 384.707665] btrfs_read_dev_super+0x5d/0xb0 [ 384.720330] ? btrfs_read_dev_one_super+0x270/0x270 [ 384.720347] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 384.720359] __btrfs_open_devices+0x194/0xab0 [ 384.720369] ? check_preemption_disabled+0x3c/0x250 [ 384.720383] ? find_device+0x100/0x100 [ 384.720392] ? btrfs_mount+0x1069/0x2b28 [ 384.720402] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.720415] btrfs_open_devices+0xa4/0xb0 [ 384.720429] btrfs_mount+0x11b4/0x2b28 [ 384.743725] ? lock_downgrade+0x6e0/0x6e0 [ 384.751706] ? find_held_lock+0x35/0x130 [ 384.751719] ? pcpu_alloc+0x3af/0x1050 [ 384.751739] ? btrfs_remount+0x11f0/0x11f0 15:18:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 384.751756] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.751771] ? __lockdep_init_map+0x10c/0x570 [ 384.751789] mount_fs+0x97/0x2a1 [ 384.751802] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.751810] ? find_held_lock+0x35/0x130 [ 384.751820] vfs_kern_mount+0x40/0x60 [ 384.751831] btrfs_mount+0x3ce/0x2b28 [ 384.751839] ? lock_downgrade+0x6e0/0x6e0 [ 384.751846] ? find_held_lock+0x35/0x130 [ 384.751855] ? pcpu_alloc+0x3af/0x1050 [ 384.786333] ? btrfs_remount+0x11f0/0x11f0 [ 384.786351] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.786373] ? __lockdep_init_map+0x10c/0x570 [ 384.786384] ? __lockdep_init_map+0x10c/0x570 [ 384.794246] mount_fs+0x97/0x2a1 [ 384.794263] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.794277] do_mount+0x417/0x27d0 [ 384.794286] ? copy_mount_options+0x5c/0x2f0 [ 384.794295] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.794307] ? copy_mount_string+0x40/0x40 [ 384.832006] ? copy_mount_options+0x1fe/0x2f0 [ 384.832021] SyS_mount+0xab/0x120 [ 384.832030] ? copy_mnt_ns+0x8c0/0x8c0 [ 384.832044] do_syscall_64+0x1e8/0x640 [ 384.832053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.832069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.841148] RIP: 0033:0x45c2ca [ 384.841154] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.841165] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 384.841171] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 384.841176] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 384.841182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 15:18:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 384.841188] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 384.845574] print_req_error: I/O error, dev loop2, sector 128 15:18:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:30 executing program 3 (fault-call:2 fault-nth:79): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 385.047149] print_req_error: I/O error, dev loop2, sector 128 15:18:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 15:18:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x5, 0x4) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 385.172426] FAULT_INJECTION: forcing a failure. [ 385.172426] name failslab, interval 1, probability 0, space 0, times 0 [ 385.205334] CPU: 1 PID: 21924 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 385.212483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.221852] Call Trace: [ 385.224452] dump_stack+0x138/0x197 [ 385.228224] should_fail.cold+0x10f/0x159 [ 385.232392] should_failslab+0xdb/0x130 [ 385.236392] kmem_cache_alloc+0x2d7/0x780 [ 385.240555] getname_kernel+0x53/0x350 [ 385.244457] kern_path+0x20/0x40 [ 385.247835] lookup_bdev.part.0+0x63/0x160 [ 385.252153] ? blkdev_open+0x260/0x260 [ 385.252167] blkdev_get_by_path+0x76/0xf0 [ 385.252181] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 385.252193] __btrfs_open_devices+0x194/0xab0 [ 385.252204] ? check_preemption_disabled+0x3c/0x250 [ 385.252217] ? find_device+0x100/0x100 [ 385.260236] ? btrfs_mount+0x1069/0x2b28 [ 385.260249] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.260265] btrfs_open_devices+0xa4/0xb0 [ 385.260275] btrfs_mount+0x11b4/0x2b28 [ 385.260286] ? lock_downgrade+0x6e0/0x6e0 [ 385.260293] ? find_held_lock+0x35/0x130 [ 385.260304] ? pcpu_alloc+0x3af/0x1050 [ 385.307814] ? btrfs_remount+0x11f0/0x11f0 [ 385.312047] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.317062] ? __lockdep_init_map+0x10c/0x570 [ 385.321551] mount_fs+0x97/0x2a1 [ 385.324907] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.329389] ? find_held_lock+0x35/0x130 [ 385.333436] vfs_kern_mount+0x40/0x60 [ 385.337225] btrfs_mount+0x3ce/0x2b28 [ 385.341018] ? lock_downgrade+0x6e0/0x6e0 [ 385.345180] ? find_held_lock+0x35/0x130 [ 385.349233] ? pcpu_alloc+0x3af/0x1050 [ 385.353117] ? btrfs_remount+0x11f0/0x11f0 [ 385.357341] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.362374] ? __lockdep_init_map+0x10c/0x570 [ 385.366860] ? __lockdep_init_map+0x10c/0x570 [ 385.371345] mount_fs+0x97/0x2a1 [ 385.374700] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.379190] do_mount+0x417/0x27d0 [ 385.382862] ? copy_mount_options+0x5c/0x2f0 [ 385.387263] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.392287] ? copy_mount_string+0x40/0x40 [ 385.396537] ? copy_mount_options+0x1fe/0x2f0 [ 385.401131] SyS_mount+0xab/0x120 [ 385.404753] ? copy_mnt_ns+0x8c0/0x8c0 [ 385.408753] do_syscall_64+0x1e8/0x640 [ 385.412630] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.417471] entry_SYSCALL_64_after_hwframe+0x42/0xb7 15:18:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 385.422649] RIP: 0033:0x45c2ca [ 385.425843] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 385.433563] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 385.440854] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 385.448118] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 385.455379] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 385.462632] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 15:18:30 executing program 3 (fault-call:2 fault-nth:80): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x4000000000000000) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) accept4$nfc_llcp(r4, &(0x7f00000001c0), &(0x7f0000000280)=0x60, 0x80000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffff7) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:30 executing program 4: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 385.598033] FAULT_INJECTION: forcing a failure. [ 385.598033] name failslab, interval 1, probability 0, space 0, times 0 15:18:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 385.707632] CPU: 0 PID: 21961 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 385.714969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.724322] Call Trace: [ 385.724342] dump_stack+0x138/0x197 [ 385.724358] should_fail.cold+0x10f/0x159 [ 385.730562] should_failslab+0xdb/0x130 [ 385.730577] kmem_cache_alloc+0x2d7/0x780 [ 385.730588] ? save_stack_trace+0x16/0x20 [ 385.730596] ? save_stack+0x45/0xd0 [ 385.730604] ? kasan_kmalloc+0xce/0xf0 [ 385.730613] ? kmem_cache_alloc_trace+0x152/0x790 [ 385.730624] ? btrfs_mount+0x1069/0x2b28 [ 385.730631] ? mount_fs+0x97/0x2a1 [ 385.730642] getname_kernel+0x53/0x350 [ 385.730652] kern_path+0x20/0x40 [ 385.730662] lookup_bdev.part.0+0x63/0x160 [ 385.730671] ? blkdev_open+0x260/0x260 [ 385.730684] ? btrfs_open_devices+0x27/0xb0 [ 385.730698] blkdev_get_by_path+0x76/0xf0 [ 385.759821] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 385.759837] __btrfs_open_devices+0x194/0xab0 [ 385.771346] ? check_preemption_disabled+0x3c/0x250 [ 385.771361] ? find_device+0x100/0x100 [ 385.771370] ? btrfs_mount+0x1069/0x2b28 [ 385.771381] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.771395] btrfs_open_devices+0xa4/0xb0 [ 385.771405] btrfs_mount+0x11b4/0x2b28 [ 385.771415] ? lock_downgrade+0x6e0/0x6e0 [ 385.771423] ? find_held_lock+0x35/0x130 [ 385.771433] ? pcpu_alloc+0x3af/0x1050 [ 385.771447] ? btrfs_remount+0x11f0/0x11f0 [ 385.771459] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.796097] ? __lockdep_init_map+0x10c/0x570 [ 385.796115] mount_fs+0x97/0x2a1 [ 385.826680] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.826694] ? find_held_lock+0x35/0x130 [ 385.838773] vfs_kern_mount+0x40/0x60 [ 385.838790] btrfs_mount+0x3ce/0x2b28 [ 385.838800] ? lock_downgrade+0x6e0/0x6e0 [ 385.838811] ? find_held_lock+0x35/0x130 [ 385.880302] ? pcpu_alloc+0x3af/0x1050 [ 385.884211] ? btrfs_remount+0x11f0/0x11f0 [ 385.888496] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.893537] ? __lockdep_init_map+0x10c/0x570 [ 385.898046] ? __lockdep_init_map+0x10c/0x570 [ 385.902566] mount_fs+0x97/0x2a1 [ 385.905953] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.910492] do_mount+0x417/0x27d0 [ 385.914038] ? copy_mount_options+0x5c/0x2f0 [ 385.918455] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.923662] ? copy_mount_string+0x40/0x40 [ 385.927912] ? copy_mount_options+0x1fe/0x2f0 [ 385.932413] SyS_mount+0xab/0x120 [ 385.932423] ? copy_mnt_ns+0x8c0/0x8c0 [ 385.932435] do_syscall_64+0x1e8/0x640 [ 385.932444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.932461] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 385.932469] RIP: 0033:0x45c2ca [ 385.932474] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 385.932482] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 385.932488] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 385.932493] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 385.932498] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 385.932504] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 386.003319] print_req_error: I/O error, dev loop2, sector 128 [ 386.014094] print_req_error: I/O error, dev loop2, sector 128 15:18:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) fstat(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="d1efb4a97a6d7c14f003d64478f6961401f2614f24a3680eb2e4f22f93f045987fb892d0466e492a8d21e2ca4e41746451367c7a", 0x34, 0x1f58}], 0xf83c4bb053d3a33b, &(0x7f0000000380)={[{@nombcache='nombcache'}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@uid_lt={'uid<', r3}}, {@hash='hash'}, {@subj_user={'subj_user'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x39, 0x30, 0x39, 0x35, 0x35, 0x76], 0x2d, [0x7f, 0x61, 0x37, 0x65], 0x2d, [0x77, 0x32, 0xeac561fa486af73, 0x33], 0x2d, [0x62, 0x66, 0x77, 0x37], 0x2d, [0x63, 0x77, 0x66, 0x7d, 0x38, 0x0, 0x31, 0x38]}}}, {@subj_role={'subj_role'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x76, 0x34, 0x33, 0x33, 0x39, 0x34, 0x61], 0x2d, [0x66, 0x35, 0x37], 0x2d, [0x0, 0x39, 0x37, 0x30], 0x2d, [0x30, 0x77, 0x64, 0x66], 0x2d, [0x62, 0x36, 0x33, 0x39, 0x3f, 0x31, 0x30]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cgroupselfwlan1eth0('}}]}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x100000001, 0x7aaa2100d242245e) pwritev(r2, 0x0, 0x12e, 0x8000000001081806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:31 executing program 3 (fault-call:2 fault-nth:81): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:31 executing program 4: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 386.246984] FAULT_INJECTION: forcing a failure. [ 386.246984] name failslab, interval 1, probability 0, space 0, times 0 [ 386.267736] CPU: 1 PID: 22018 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 386.274893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.284422] Call Trace: [ 386.284442] dump_stack+0x138/0x197 [ 386.284460] should_fail.cold+0x10f/0x159 [ 386.284477] should_failslab+0xdb/0x130 [ 386.290676] kmem_cache_alloc_node+0x56/0x780 [ 386.290698] create_task_io_context+0x31/0x3d0 [ 386.290711] generic_make_request_checks+0x1505/0x1ac0 [ 386.290723] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.290735] ? blk_cleanup_queue+0x610/0x610 [ 386.322756] ? trace_hardirqs_on+0x10/0x10 [ 386.327016] generic_make_request+0x7d/0xa40 [ 386.331660] ? blk_queue_enter+0x520/0x520 [ 386.336492] ? find_held_lock+0x35/0x130 [ 386.340598] ? guard_bio_eod+0x161/0x530 [ 386.345381] submit_bio+0x1a5/0x3f0 [ 386.349005] ? submit_bio+0x1a5/0x3f0 [ 386.352808] ? generic_make_request+0xa40/0xa40 [ 386.357473] ? guard_bio_eod+0x1fd/0x530 [ 386.361522] submit_bh_wbc+0x550/0x720 [ 386.365429] __bread_gfp+0x106/0x290 [ 386.369136] btrfs_read_dev_one_super+0x9f/0x270 [ 386.373964] btrfs_read_dev_super+0x5d/0xb0 [ 386.378269] ? btrfs_read_dev_one_super+0x270/0x270 [ 386.383283] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 386.387799] __btrfs_open_devices+0x194/0xab0 [ 386.392320] ? check_preemption_disabled+0x3c/0x250 [ 386.397365] ? find_device+0x100/0x100 [ 386.401270] ? btrfs_mount+0x1069/0x2b28 [ 386.405331] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.410431] btrfs_open_devices+0xa4/0xb0 [ 386.414567] btrfs_mount+0x11b4/0x2b28 [ 386.418480] ? lock_downgrade+0x6e0/0x6e0 [ 386.422620] ? find_held_lock+0x35/0x130 [ 386.426695] ? pcpu_alloc+0x3af/0x1050 [ 386.430586] ? btrfs_remount+0x11f0/0x11f0 [ 386.434812] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.440836] ? __lockdep_init_map+0x10c/0x570 [ 386.445331] mount_fs+0x97/0x2a1 [ 386.448684] vfs_kern_mount.part.0+0x5e/0x3d0 [ 386.453165] ? find_held_lock+0x35/0x130 [ 386.457211] vfs_kern_mount+0x40/0x60 [ 386.460999] btrfs_mount+0x3ce/0x2b28 [ 386.464809] ? lock_downgrade+0x6e0/0x6e0 [ 386.468960] ? find_held_lock+0x35/0x130 [ 386.473188] ? pcpu_alloc+0x3af/0x1050 [ 386.477069] ? btrfs_remount+0x11f0/0x11f0 [ 386.481296] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.486332] ? __lockdep_init_map+0x10c/0x570 [ 386.490912] ? __lockdep_init_map+0x10c/0x570 [ 386.495395] mount_fs+0x97/0x2a1 [ 386.498750] vfs_kern_mount.part.0+0x5e/0x3d0 [ 386.503266] do_mount+0x417/0x27d0 [ 386.506804] ? copy_mount_options+0x5c/0x2f0 [ 386.511203] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.516209] ? copy_mount_string+0x40/0x40 [ 386.520436] ? copy_mount_options+0x1fe/0x2f0 [ 386.524922] SyS_mount+0xab/0x120 [ 386.528384] ? copy_mnt_ns+0x8c0/0x8c0 [ 386.532264] do_syscall_64+0x1e8/0x640 [ 386.536145] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.540975] entry_SYSCALL_64_after_hwframe+0x42/0xb7 15:18:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000080)=0x7, 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 386.546169] RIP: 0033:0x45c2ca [ 386.549345] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 386.557045] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 386.564301] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 386.571553] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 386.578859] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 386.586123] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$SIOCAX25OPTRT(r3, 0x89e7, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x2, 0x76}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:31 executing program 4: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 386.743321] print_req_error: I/O error, dev loop1, sector 128 15:18:31 executing program 3 (fault-call:2 fault-nth:82): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 386.971517] FAULT_INJECTION: forcing a failure. [ 386.971517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.983373] CPU: 0 PID: 22068 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 386.990474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.990480] Call Trace: [ 386.990499] dump_stack+0x138/0x197 [ 386.990518] should_fail.cold+0x10f/0x159 [ 386.990532] __alloc_pages_nodemask+0x1d6/0x7a0 [ 386.990544] ? __alloc_pages_slowpath+0x2930/0x2930 [ 386.990563] cache_grow_begin+0x80/0x400 [ 386.990577] kmem_cache_alloc+0x6a6/0x780 [ 386.990593] getname_kernel+0x53/0x350 [ 386.990608] kern_path+0x20/0x40 [ 387.002562] lookup_bdev.part.0+0x63/0x160 [ 387.002572] ? blkdev_open+0x260/0x260 [ 387.002585] blkdev_get_by_path+0x76/0xf0 [ 387.047751] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 387.052252] __btrfs_open_devices+0x194/0xab0 [ 387.052267] ? check_preemption_disabled+0x3c/0x250 [ 387.052282] ? find_device+0x100/0x100 [ 387.052293] ? btrfs_mount+0x1069/0x2b28 15:18:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) signalfd(r1, &(0x7f0000000000)={0x5}, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 387.052304] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.052318] btrfs_open_devices+0xa4/0xb0 [ 387.052328] btrfs_mount+0x11b4/0x2b28 [ 387.052338] ? lock_downgrade+0x6e0/0x6e0 [ 387.052346] ? find_held_lock+0x35/0x130 [ 387.052355] ? pcpu_alloc+0x3af/0x1050 [ 387.052369] ? btrfs_remount+0x11f0/0x11f0 [ 387.074832] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.074855] ? __lockdep_init_map+0x10c/0x570 [ 387.074874] mount_fs+0x97/0x2a1 [ 387.074889] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.074899] ? find_held_lock+0x35/0x130 15:18:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 387.087177] vfs_kern_mount+0x40/0x60 [ 387.095141] btrfs_mount+0x3ce/0x2b28 [ 387.095156] ? lock_downgrade+0x6e0/0x6e0 [ 387.095164] ? find_held_lock+0x35/0x130 [ 387.095175] ? pcpu_alloc+0x3af/0x1050 [ 387.095191] ? btrfs_remount+0x11f0/0x11f0 [ 387.144872] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.149916] ? __lockdep_init_map+0x10c/0x570 [ 387.154428] ? __lockdep_init_map+0x10c/0x570 [ 387.158944] mount_fs+0x97/0x2a1 [ 387.162356] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.166858] do_mount+0x417/0x27d0 [ 387.170404] ? copy_mount_options+0x5c/0x2f0 [ 387.174912] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.179940] ? copy_mount_string+0x40/0x40 [ 387.184193] ? copy_mount_options+0x1fe/0x2f0 [ 387.188698] SyS_mount+0xab/0x120 [ 387.188709] ? copy_mnt_ns+0x8c0/0x8c0 [ 387.188723] do_syscall_64+0x1e8/0x640 [ 387.188732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 387.188750] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 387.188757] RIP: 0033:0x45c2ca [ 387.188762] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 387.200071] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 387.200078] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 387.200084] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 387.200090] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 387.200095] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 387.258721] print_req_error: I/O error, dev loop2, sector 128 15:18:32 executing program 3 (fault-call:2 fault-nth:83): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) write$UHID_INPUT(r0, &(0x7f0000000300)={0x8, "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", 0x1000}, 0x1006) ptrace$poke(0x5, r3, &(0x7f0000000080), 0x10001) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 387.426252] FAULT_INJECTION: forcing a failure. [ 387.426252] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 387.438108] CPU: 1 PID: 22108 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 387.445217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.454599] Call Trace: [ 387.454623] dump_stack+0x138/0x197 [ 387.454642] should_fail.cold+0x10f/0x159 [ 387.454657] __alloc_pages_nodemask+0x1d6/0x7a0 [ 387.454670] ? __alloc_pages_slowpath+0x2930/0x2930 [ 387.461056] cache_grow_begin+0x80/0x400 [ 387.461073] kmem_cache_alloc+0x6a6/0x780 [ 387.461089] getname_kernel+0x53/0x350 [ 387.461099] kern_path+0x20/0x40 [ 387.470010] lookup_bdev.part.0+0x63/0x160 [ 387.470019] ? blkdev_open+0x260/0x260 [ 387.470032] blkdev_get_by_path+0x76/0xf0 [ 387.470043] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 387.470054] __btrfs_open_devices+0x194/0xab0 [ 387.483271] ? check_preemption_disabled+0x3c/0x250 [ 387.483290] ? find_device+0x100/0x100 [ 387.483301] ? btrfs_mount+0x1069/0x2b28 15:18:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000240)="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"/269) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 387.483312] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.483327] btrfs_open_devices+0xa4/0xb0 [ 387.490594] btrfs_mount+0x11b4/0x2b28 [ 387.490608] ? lock_downgrade+0x6e0/0x6e0 [ 387.490616] ? find_held_lock+0x35/0x130 [ 387.490626] ? pcpu_alloc+0x3af/0x1050 [ 387.490642] ? btrfs_remount+0x11f0/0x11f0 [ 387.507469] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.507496] ? __lockdep_init_map+0x10c/0x570 [ 387.564012] mount_fs+0x97/0x2a1 [ 387.567392] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.571911] ? find_held_lock+0x35/0x130 [ 387.571925] vfs_kern_mount+0x40/0x60 [ 387.571941] btrfs_mount+0x3ce/0x2b28 [ 387.571951] ? lock_downgrade+0x6e0/0x6e0 [ 387.571958] ? find_held_lock+0x35/0x130 [ 387.571967] ? pcpu_alloc+0x3af/0x1050 [ 387.571983] ? btrfs_remount+0x11f0/0x11f0 [ 387.571997] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.572013] ? __lockdep_init_map+0x10c/0x570 [ 387.579870] ? __lockdep_init_map+0x10c/0x570 [ 387.587816] mount_fs+0x97/0x2a1 [ 387.587833] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.587846] do_mount+0x417/0x27d0 [ 387.587854] ? copy_mount_options+0x5c/0x2f0 [ 387.587867] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.635172] ? copy_mount_string+0x40/0x40 [ 387.639423] ? copy_mount_options+0x1fe/0x2f0 [ 387.643934] SyS_mount+0xab/0x120 [ 387.647397] ? copy_mnt_ns+0x8c0/0x8c0 [ 387.651293] do_syscall_64+0x1e8/0x640 [ 387.655321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 387.660178] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 387.665378] RIP: 0033:0x45c2ca [ 387.668572] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 387.676296] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 387.683585] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 387.691038] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 387.698363] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 387.705724] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9b, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r0, 0x0, 0xfffffffffffffd61, 0xffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:32 executing program 3 (fault-call:2 fault-nth:84): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000400)={0x5d4f79661992744, 0x20, &(0x7f0000000340)="f7e0abcbdd7e7eed9956dd5a00806fb54eb1d61b487bb9a2e2aa0cd3e2880938d71a1ecb065b798a5127f1bb138389d3b145ea6745fe67d83cadbae76f051ff0052a3be0127d456b0308d63f774e5554d932fe5434bbc89e92795ac70ca014a52ea51a82cc17ecfe1ae8fe900c6ae5c29db3cf57721f4d8ba572d6191a4c5530838bc66d3deadb52f3ebf3392c13202913f29c877981563c5fd0", {0x9, 0x80000001, 0xb5315258, 0x1, 0x200, 0x7fffffff, 0x3, 0x100000000}}) ioctl(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0xfff) r2 = accept4(r0, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 387.960610] FAULT_INJECTION: forcing a failure. [ 387.960610] name failslab, interval 1, probability 0, space 0, times 0 [ 388.035884] CPU: 1 PID: 22167 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 388.043050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.052419] Call Trace: [ 388.055028] dump_stack+0x138/0x197 [ 388.058671] should_fail.cold+0x10f/0x159 [ 388.062833] ? __lock_is_held+0xb6/0x140 [ 388.066910] ? mempool_free+0x1d0/0x1d0 [ 388.070890] should_failslab+0xdb/0x130 [ 388.074860] kmem_cache_alloc+0x47/0x780 [ 388.078908] ? mempool_free+0x1d0/0x1d0 [ 388.083158] mempool_alloc_slab+0x47/0x60 [ 388.087685] mempool_alloc+0x138/0x300 [ 388.091561] ? __find_get_block+0x5c4/0xb10 [ 388.095989] ? remove_element.isra.0+0x1b0/0x1b0 [ 388.100787] ? mark_held_locks+0xb1/0x100 [ 388.104930] ? save_trace+0x290/0x290 [ 388.108728] ? trace_hardirqs_on_caller+0x400/0x590 [ 388.113773] bio_alloc_bioset+0x368/0x680 [ 388.117920] ? bvec_alloc+0x2e0/0x2e0 [ 388.121733] ? __getblk_gfp+0x5c/0x710 [ 388.125612] submit_bh_wbc+0xf6/0x720 [ 388.129516] __bread_gfp+0x106/0x290 [ 388.133226] btrfs_read_dev_one_super+0x9f/0x270 [ 388.137989] btrfs_read_dev_super+0x5d/0xb0 [ 388.142421] ? btrfs_read_dev_one_super+0x270/0x270 [ 388.147476] ? set_blocksize+0x270/0x300 [ 388.151529] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 388.156043] __btrfs_open_devices+0x194/0xab0 [ 388.160572] ? check_preemption_disabled+0x3c/0x250 [ 388.165688] ? find_device+0x100/0x100 [ 388.169582] ? btrfs_mount+0x1069/0x2b28 [ 388.173834] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.178844] btrfs_open_devices+0xa4/0xb0 [ 388.182978] btrfs_mount+0x11b4/0x2b28 [ 388.186862] ? lock_downgrade+0x6e0/0x6e0 [ 388.191017] ? find_held_lock+0x35/0x130 [ 388.195075] ? pcpu_alloc+0x3af/0x1050 [ 388.198960] ? btrfs_remount+0x11f0/0x11f0 [ 388.203350] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.208389] ? __lockdep_init_map+0x10c/0x570 [ 388.212929] mount_fs+0x97/0x2a1 [ 388.216397] vfs_kern_mount.part.0+0x5e/0x3d0 [ 388.220911] ? find_held_lock+0x35/0x130 [ 388.225040] vfs_kern_mount+0x40/0x60 [ 388.228851] btrfs_mount+0x3ce/0x2b28 [ 388.232637] ? lock_downgrade+0x6e0/0x6e0 [ 388.236765] ? find_held_lock+0x35/0x130 [ 388.240809] ? pcpu_alloc+0x3af/0x1050 [ 388.244883] ? btrfs_remount+0x11f0/0x11f0 [ 388.249208] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.254307] ? __lockdep_init_map+0x10c/0x570 [ 388.258877] ? __lockdep_init_map+0x10c/0x570 [ 388.263361] mount_fs+0x97/0x2a1 [ 388.266716] vfs_kern_mount.part.0+0x5e/0x3d0 [ 388.271228] do_mount+0x417/0x27d0 [ 388.274784] ? copy_mount_options+0x5c/0x2f0 [ 388.279183] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.284200] ? copy_mount_string+0x40/0x40 [ 388.288426] ? copy_mount_options+0x1fe/0x2f0 [ 388.292909] SyS_mount+0xab/0x120 [ 388.296717] ? copy_mnt_ns+0x8c0/0x8c0 [ 388.300705] do_syscall_64+0x1e8/0x640 [ 388.304587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.309429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 388.314710] RIP: 0033:0x45c2ca [ 388.317885] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.325581] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca 15:18:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 388.332867] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 388.340337] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 388.347594] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 388.354941] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000080)={0x9, 0x1, 0x0, 0xfffffffffffffffc, 0x1000}, 0xc) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000300)={0x9, 0x100000000, 0x3ff, 'queue0\x00', 0x3}) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f00000001c0)={0x6, 0x3447504d, 0x8, 0x40, 0x2, @stepwise={{0x5, 0x7f}, {0x3, 0x7ff}, {0x8, 0x3ff}}}) r4 = fcntl$getown(r0, 0x9) sched_getaffinity(r4, 0x8, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() 15:18:33 executing program 3 (fault-call:2 fault-nth:85): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:18:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x6, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = accept(r0, &(0x7f00000001c0)=@un=@abs, &(0x7f0000000000)=0x80) accept$unix(r3, &(0x7f0000000300), &(0x7f0000000080)=0x6e) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() [ 388.756737] FAULT_INJECTION: forcing a failure. [ 388.756737] name failslab, interval 1, probability 0, space 0, times 0 [ 388.854708] CPU: 1 PID: 22217 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 388.861957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.871370] Call Trace: [ 388.873974] dump_stack+0x138/0x197 [ 388.877620] should_fail.cold+0x10f/0x159 [ 388.881792] should_failslab+0xdb/0x130 [ 388.885778] kmem_cache_alloc_trace+0x2e9/0x790 [ 388.890468] btrfs_alloc_device+0xa4/0x6a0 [ 388.894708] ? __kmalloc+0x376/0x7a0 [ 388.894730] ? btrfs_find_device_by_devspec+0xf0/0xf0 [ 388.894741] ? __btrfs_close_devices+0x323/0xa90 [ 388.894754] __btrfs_close_devices+0x2c6/0xa90 [ 388.894768] ? btrfs_alloc_device+0x6a0/0x6a0 [ 388.903670] btrfs_close_devices+0x29/0x140 [ 388.903685] btrfs_mount+0x1fd9/0x2b28 [ 388.903697] ? lock_downgrade+0x6e0/0x6e0 [ 388.903705] ? find_held_lock+0x35/0x130 [ 388.903714] ? pcpu_alloc+0x3af/0x1050 [ 388.903728] ? btrfs_remount+0x11f0/0x11f0 [ 388.903742] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.903759] ? __lockdep_init_map+0x10c/0x570 [ 388.903774] mount_fs+0x97/0x2a1 [ 388.955085] vfs_kern_mount.part.0+0x5e/0x3d0 [ 388.959594] ? find_held_lock+0x35/0x130 [ 388.963699] vfs_kern_mount+0x40/0x60 [ 388.967519] btrfs_mount+0x3ce/0x2b28 [ 388.971331] ? lock_downgrade+0x6e0/0x6e0 [ 388.975593] ? find_held_lock+0x35/0x130 [ 388.979697] ? pcpu_alloc+0x3af/0x1050 [ 388.983609] ? btrfs_remount+0x11f0/0x11f0 [ 388.987865] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.993203] ? __lockdep_init_map+0x10c/0x570 [ 388.997745] ? __lockdep_init_map+0x10c/0x570 15:18:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 15:18:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) flock(r0, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 389.002351] mount_fs+0x97/0x2a1 [ 389.005732] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.010385] do_mount+0x417/0x27d0 [ 389.013937] ? copy_mount_options+0x5c/0x2f0 [ 389.018444] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.023484] ? copy_mount_string+0x40/0x40 [ 389.027741] ? copy_mount_options+0x1fe/0x2f0 [ 389.032247] SyS_mount+0xab/0x120 [ 389.035707] ? copy_mnt_ns+0x8c0/0x8c0 [ 389.039603] do_syscall_64+0x1e8/0x640 [ 389.043500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.048366] entry_SYSCALL_64_after_hwframe+0x42/0xb7 15:18:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 389.053585] RIP: 0033:0x45c2ca [ 389.053592] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 389.053603] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 389.053609] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 389.053615] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 389.053621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 389.053627] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 15:18:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000300)="11dcb4be94ab6729915c70ad7896e103b906ef922e92e0954230c0dcabf444e3adb6f6342608bf5e83796c7692271afe34b3613fef40c4c6bd00000000000000a74f7f44e9a19bb0f42b9256cd721413da83156b08b82cb8b3256cbbd42cb9acfa8a4d0eb9d77e54db3afd88a71e17d2c7bfae12446252a1fd926aaa0000000000000000") prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000580)=ANY=[@ANYBLOB="040000000000000000000000000000000000000000000000885e045e46541eb4e0e0330414f5160d28015dae80c252dd179dde7c2d59f3b681b234e729e596b44dcb8c9db64cf34fec2b6aa66cf9068828f9a9aa2422a55b4635432dfa3e0b29943ca449ed0ef99a06fbbf327bf4ac0396d7a8531e260065902da7188560eff9e961bb56f3f8989fbbc6865aa71093f3d674bc60b3b7591350124dcdbfa19f2791e21cab51c06c23e00ce57861ee957f753f183b8bea2e4ec2fdf745f2ec12a34a1ca3db2712a7b609c690d2e72ec1a98883e03edd0d3d681de81f23a8"]) set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000004c0)={r0, r0, 0x1000, 0xd8, &(0x7f00000003c0)="e038a75b2e7dc8be42bdf9d858716c39d9ecbc03e2e84b0b103bcac6d403375d48fa180e47acdbc5dd4374bc21dbf7c4bb8fb5f698ba01379af018cc6f76fd77c3775ce0e80f06549890e9e45f8a8d8cdddc762a30bc3d234732a19b7874a5caadc829841061ae15e8e9c5925f52e7b110796afe293899b8a6f02f4659950eb1fc295c2fbafeb310b4d775a96c8c21fee4d00e3f54c418eced89fca9cf761e52a96cf375535be228051a58d2643f91604f9474a85d297105853c6435f9b7ecec6aa3be19291445bf155347757c4f51d6240ef248b9ee6699", 0x20, 0x1f, 0xd2, 0x37d, 0x7ff, 0x3, 0x80000000, 'syz0\x00'}) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) getegid() setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x9, 0x4) [ 389.258027] ------------[ cut here ]------------ [ 389.262850] kernel BUG at fs/btrfs/volumes.c:890! [ 389.267893] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 389.273283] Modules linked in: [ 389.276474] CPU: 1 PID: 22217 Comm: syz-executor.3 Not tainted 4.14.141 #37 [ 389.283570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.292929] task: ffff8880621d21c0 task.stack: ffff88807d930000 [ 389.298990] RIP: 0010:__btrfs_close_devices+0x7d8/0xa90 [ 389.304344] RSP: 0018:ffff88807d937700 EFLAGS: 00010246 [ 389.309708] RAX: 0000000000040000 RBX: ffff88809c3c4940 RCX: ffffc90005acf000 [ 389.317049] RDX: 0000000000040000 RSI: ffffffff8265b718 RDI: 0000000000000286 [ 389.324829] RBP: ffff88807d9377c8 R08: ffff8880621d21c0 R09: ffff8880621d2a88 [ 389.332088] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888099a61540 [ 389.339349] R13: ffff88809c3c4a08 R14: fffffffffffffff4 R15: dffffc0000000000 [ 389.346629] FS: 00007fa8c3250700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 389.354994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 389.360968] CR2: 00007f5f6af01000 CR3: 0000000094f82000 CR4: 00000000001406e0 [ 389.368253] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 389.375537] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 389.382798] Call Trace: [ 389.385385] ? btrfs_alloc_device+0x6a0/0x6a0 [ 389.389870] btrfs_close_devices+0x29/0x140 [ 389.394818] btrfs_mount+0x1fd9/0x2b28 [ 389.398840] ? lock_downgrade+0x6e0/0x6e0 [ 389.402976] ? find_held_lock+0x35/0x130 [ 389.407019] ? pcpu_alloc+0x3af/0x1050 [ 389.410993] ? btrfs_remount+0x11f0/0x11f0 [ 389.415360] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.420387] ? __lockdep_init_map+0x10c/0x570 [ 389.424896] mount_fs+0x97/0x2a1 [ 389.428383] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.432888] ? find_held_lock+0x35/0x130 [ 389.436937] vfs_kern_mount+0x40/0x60 [ 389.440744] btrfs_mount+0x3ce/0x2b28 [ 389.444538] ? lock_downgrade+0x6e0/0x6e0 [ 389.448669] ? find_held_lock+0x35/0x130 [ 389.452725] ? pcpu_alloc+0x3af/0x1050 [ 389.456604] ? btrfs_remount+0x11f0/0x11f0 [ 389.460869] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.465898] ? __lockdep_init_map+0x10c/0x570 [ 389.470409] ? __lockdep_init_map+0x10c/0x570 [ 389.475004] mount_fs+0x97/0x2a1 [ 389.478357] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.482837] do_mount+0x417/0x27d0 [ 389.486383] ? copy_mount_options+0x5c/0x2f0 [ 389.490566] kobject: 'loop0' (ffff8880a9c54260): kobject_uevent_env [ 389.490808] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.497216] kobject: 'loop0' (ffff8880a9c54260): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 389.502213] ? copy_mount_string+0x40/0x40 [ 389.502223] ? copy_mount_options+0x1fe/0x2f0 [ 389.502231] SyS_mount+0xab/0x120 [ 389.502238] ? copy_mnt_ns+0x8c0/0x8c0 [ 389.502250] do_syscall_64+0x1e8/0x640 [ 389.531711] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.536539] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 389.541716] RIP: 0033:0x45c2ca [ 389.544887] RSP: 002b:00007fa8c324fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 389.552602] RAX: ffffffffffffffda RBX: 00007fa8c324fb40 RCX: 000000000045c2ca [ 389.559856] RDX: 00007fa8c324fae0 RSI: 0000000020000100 RDI: 00007fa8c324fb00 [ 389.567120] RBP: 0000000000000001 R08: 00007fa8c324fb40 R09: 00007fa8c324fae0 [ 389.574373] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 389.581717] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 389.589072] Code: c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 59 02 00 00 48 8b 45 80 c7 80 10 01 00 00 00 00 00 00 e9 e2 f8 ff ff e8 58 2a f7 fe <0f> 0b e8 51 2a f7 fe 0f 0b 48 89 f7 e8 57 da 20 ff e9 ad f8 ff [ 389.608310] RIP: __btrfs_close_devices+0x7d8/0xa90 RSP: ffff88807d937700 [ 389.616375] ---[ end trace 2709905dfba3c713 ]--- [ 389.621428] Kernel panic - not syncing: Fatal exception [ 389.624531] kobject: 'loop3' (ffff8880a4a009a0): kobject_uevent_env [ 389.628416] Kernel Offset: disabled [ 389.638461] Rebooting in 86400 seconds..